SUSE-SU-2019:2072-1
Vulnerability from csaf_suse - Published: 2019-08-06 22:52 - Updated: 2019-08-06 22:52Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch:
The SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).
- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
The following non-security bugs were fixed:
- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189) A dedicated CVE was already assigned
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- Add back sibling paca poiter to paca (bsc#1055117).
- Add support for crct10dif-vpmsum ().
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- asoc : cs4265 : readable register too low (bsc#1051510).
- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath6kl: add some bounds checking (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- hid: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid: wacom: generic: Correct pad syncing (bsc#1051510).
- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: fix Guest installation fails by 'Invalid value '0-31' for 'cpuset.cpus': Invalid argument' (bsc#1143507)
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci: Return error if cannot probe VF (bsc#1051510).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).
- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
Patchnames: SUSE-2019-2072,SUSE-SLE-DESKTOP-12-SP4-2019-2072,SUSE-SLE-HA-12-SP4-2019-2072,SUSE-SLE-Live-Patching-12-SP4-2019-2072,SUSE-SLE-SDK-12-SP4-2019-2072,SUSE-SLE-SERVER-12-SP4-2019-2072,SUSE-SLE-WE-12-SP4-2019-2072
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n\n\nThe following non-security bugs were fixed:\n- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189) A dedicated CVE was already assigned\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Add support for crct10dif-vpmsum ().\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- asoc : cs4265 : readable register too low (bsc#1051510).\n- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath6kl: add some bounds checking (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- hid: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: fix Guest installation fails by \u0027Invalid value \u00270-31\u0027 for \u0027cpuset.cpus\u0027: Invalid argument\u0027 (bsc#1143507)\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027 Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- rds: ib: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995).\n- Revert \u0027serial: 8250: Do not service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2072,SUSE-SLE-DESKTOP-12-SP4-2019-2072,SUSE-SLE-HA-12-SP4-2019-2072,SUSE-SLE-Live-Patching-12-SP4-2019-2072,SUSE-SLE-SDK-12-SP4-2019-2072,SUSE-SLE-SERVER-12-SP4-2019-2072,SUSE-SLE-WE-12-SP4-2019-2072",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2072-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2072-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192072-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2072-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1083710",
"url": "https://bugzilla.suse.com/1083710"
},
{
"category": "self",
"summary": "SUSE Bug 1102247",
"url": "https://bugzilla.suse.com/1102247"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1119222",
"url": "https://bugzilla.suse.com/1119222"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1127034",
"url": "https://bugzilla.suse.com/1127034"
},
{
"category": "self",
"summary": "SUSE Bug 1127315",
"url": "https://bugzilla.suse.com/1127315"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1134097",
"url": "https://bugzilla.suse.com/1134097"
},
{
"category": "self",
"summary": "SUSE Bug 1134390",
"url": "https://bugzilla.suse.com/1134390"
},
{
"category": "self",
"summary": "SUSE Bug 1134399",
"url": "https://bugzilla.suse.com/1134399"
},
{
"category": "self",
"summary": "SUSE Bug 1135335",
"url": "https://bugzilla.suse.com/1135335"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1136896",
"url": "https://bugzilla.suse.com/1136896"
},
{
"category": "self",
"summary": "SUSE Bug 1137458",
"url": "https://bugzilla.suse.com/1137458"
},
{
"category": "self",
"summary": "SUSE Bug 1137534",
"url": "https://bugzilla.suse.com/1137534"
},
{
"category": "self",
"summary": "SUSE Bug 1137535",
"url": "https://bugzilla.suse.com/1137535"
},
{
"category": "self",
"summary": "SUSE Bug 1137584",
"url": "https://bugzilla.suse.com/1137584"
},
{
"category": "self",
"summary": "SUSE Bug 1137609",
"url": "https://bugzilla.suse.com/1137609"
},
{
"category": "self",
"summary": "SUSE Bug 1137811",
"url": "https://bugzilla.suse.com/1137811"
},
{
"category": "self",
"summary": "SUSE Bug 1137827",
"url": "https://bugzilla.suse.com/1137827"
},
{
"category": "self",
"summary": "SUSE Bug 1139358",
"url": "https://bugzilla.suse.com/1139358"
},
{
"category": "self",
"summary": "SUSE Bug 1140133",
"url": "https://bugzilla.suse.com/1140133"
},
{
"category": "self",
"summary": "SUSE Bug 1140139",
"url": "https://bugzilla.suse.com/1140139"
},
{
"category": "self",
"summary": "SUSE Bug 1140322",
"url": "https://bugzilla.suse.com/1140322"
},
{
"category": "self",
"summary": "SUSE Bug 1140652",
"url": "https://bugzilla.suse.com/1140652"
},
{
"category": "self",
"summary": "SUSE Bug 1140887",
"url": "https://bugzilla.suse.com/1140887"
},
{
"category": "self",
"summary": "SUSE Bug 1140888",
"url": "https://bugzilla.suse.com/1140888"
},
{
"category": "self",
"summary": "SUSE Bug 1140889",
"url": "https://bugzilla.suse.com/1140889"
},
{
"category": "self",
"summary": "SUSE Bug 1140891",
"url": "https://bugzilla.suse.com/1140891"
},
{
"category": "self",
"summary": "SUSE Bug 1140893",
"url": "https://bugzilla.suse.com/1140893"
},
{
"category": "self",
"summary": "SUSE Bug 1140903",
"url": "https://bugzilla.suse.com/1140903"
},
{
"category": "self",
"summary": "SUSE Bug 1140945",
"url": "https://bugzilla.suse.com/1140945"
},
{
"category": "self",
"summary": "SUSE Bug 1140954",
"url": "https://bugzilla.suse.com/1140954"
},
{
"category": "self",
"summary": "SUSE Bug 1140955",
"url": "https://bugzilla.suse.com/1140955"
},
{
"category": "self",
"summary": "SUSE Bug 1140956",
"url": "https://bugzilla.suse.com/1140956"
},
{
"category": "self",
"summary": "SUSE Bug 1140957",
"url": "https://bugzilla.suse.com/1140957"
},
{
"category": "self",
"summary": "SUSE Bug 1140958",
"url": "https://bugzilla.suse.com/1140958"
},
{
"category": "self",
"summary": "SUSE Bug 1140959",
"url": "https://bugzilla.suse.com/1140959"
},
{
"category": "self",
"summary": "SUSE Bug 1140960",
"url": "https://bugzilla.suse.com/1140960"
},
{
"category": "self",
"summary": "SUSE Bug 1140961",
"url": "https://bugzilla.suse.com/1140961"
},
{
"category": "self",
"summary": "SUSE Bug 1140962",
"url": "https://bugzilla.suse.com/1140962"
},
{
"category": "self",
"summary": "SUSE Bug 1140964",
"url": "https://bugzilla.suse.com/1140964"
},
{
"category": "self",
"summary": "SUSE Bug 1140971",
"url": "https://bugzilla.suse.com/1140971"
},
{
"category": "self",
"summary": "SUSE Bug 1140972",
"url": "https://bugzilla.suse.com/1140972"
},
{
"category": "self",
"summary": "SUSE Bug 1140992",
"url": "https://bugzilla.suse.com/1140992"
},
{
"category": "self",
"summary": "SUSE Bug 1141401",
"url": "https://bugzilla.suse.com/1141401"
},
{
"category": "self",
"summary": "SUSE Bug 1141402",
"url": "https://bugzilla.suse.com/1141402"
},
{
"category": "self",
"summary": "SUSE Bug 1141452",
"url": "https://bugzilla.suse.com/1141452"
},
{
"category": "self",
"summary": "SUSE Bug 1141453",
"url": "https://bugzilla.suse.com/1141453"
},
{
"category": "self",
"summary": "SUSE Bug 1141454",
"url": "https://bugzilla.suse.com/1141454"
},
{
"category": "self",
"summary": "SUSE Bug 1141478",
"url": "https://bugzilla.suse.com/1141478"
},
{
"category": "self",
"summary": "SUSE Bug 1142023",
"url": "https://bugzilla.suse.com/1142023"
},
{
"category": "self",
"summary": "SUSE Bug 1142112",
"url": "https://bugzilla.suse.com/1142112"
},
{
"category": "self",
"summary": "SUSE Bug 1142220",
"url": "https://bugzilla.suse.com/1142220"
},
{
"category": "self",
"summary": "SUSE Bug 1142221",
"url": "https://bugzilla.suse.com/1142221"
},
{
"category": "self",
"summary": "SUSE Bug 1142254",
"url": "https://bugzilla.suse.com/1142254"
},
{
"category": "self",
"summary": "SUSE Bug 1142350",
"url": "https://bugzilla.suse.com/1142350"
},
{
"category": "self",
"summary": "SUSE Bug 1142351",
"url": "https://bugzilla.suse.com/1142351"
},
{
"category": "self",
"summary": "SUSE Bug 1142354",
"url": "https://bugzilla.suse.com/1142354"
},
{
"category": "self",
"summary": "SUSE Bug 1142359",
"url": "https://bugzilla.suse.com/1142359"
},
{
"category": "self",
"summary": "SUSE Bug 1142450",
"url": "https://bugzilla.suse.com/1142450"
},
{
"category": "self",
"summary": "SUSE Bug 1142701",
"url": "https://bugzilla.suse.com/1142701"
},
{
"category": "self",
"summary": "SUSE Bug 1142868",
"url": "https://bugzilla.suse.com/1142868"
},
{
"category": "self",
"summary": "SUSE Bug 1143003",
"url": "https://bugzilla.suse.com/1143003"
},
{
"category": "self",
"summary": "SUSE Bug 1143045",
"url": "https://bugzilla.suse.com/1143045"
},
{
"category": "self",
"summary": "SUSE Bug 1143105",
"url": "https://bugzilla.suse.com/1143105"
},
{
"category": "self",
"summary": "SUSE Bug 1143185",
"url": "https://bugzilla.suse.com/1143185"
},
{
"category": "self",
"summary": "SUSE Bug 1143189",
"url": "https://bugzilla.suse.com/1143189"
},
{
"category": "self",
"summary": "SUSE Bug 1143191",
"url": "https://bugzilla.suse.com/1143191"
},
{
"category": "self",
"summary": "SUSE Bug 1143507",
"url": "https://bugzilla.suse.com/1143507"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20855 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1125 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11810 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13631 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13648 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14283 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14284 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14284/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-08-06T22:52:10Z",
"generator": {
"date": "2019-08-06T22:52:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2072-1",
"initial_release_date": "2019-08-06T22:52:10Z",
"revision_history": [
{
"date": "2019-08-06T22:52:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.29.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.29.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.29.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.29.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-al-4.12.14-95.29.1.aarch64",
"product_id": "dtb-al-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-allwinner-4.12.14-95.29.1.aarch64",
"product_id": "dtb-allwinner-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-altera-4.12.14-95.29.1.aarch64",
"product_id": "dtb-altera-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-amd-4.12.14-95.29.1.aarch64",
"product_id": "dtb-amd-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-amlogic-4.12.14-95.29.1.aarch64",
"product_id": "dtb-amlogic-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-apm-4.12.14-95.29.1.aarch64",
"product_id": "dtb-apm-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-arm-4.12.14-95.29.1.aarch64",
"product_id": "dtb-arm-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-broadcom-4.12.14-95.29.1.aarch64",
"product_id": "dtb-broadcom-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-cavium-4.12.14-95.29.1.aarch64",
"product_id": "dtb-cavium-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-exynos-4.12.14-95.29.1.aarch64",
"product_id": "dtb-exynos-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-freescale-4.12.14-95.29.1.aarch64",
"product_id": "dtb-freescale-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-hisilicon-4.12.14-95.29.1.aarch64",
"product_id": "dtb-hisilicon-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-lg-4.12.14-95.29.1.aarch64",
"product_id": "dtb-lg-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-marvell-4.12.14-95.29.1.aarch64",
"product_id": "dtb-marvell-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-mediatek-4.12.14-95.29.1.aarch64",
"product_id": "dtb-mediatek-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-nvidia-4.12.14-95.29.1.aarch64",
"product_id": "dtb-nvidia-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-qcom-4.12.14-95.29.1.aarch64",
"product_id": "dtb-qcom-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-renesas-4.12.14-95.29.1.aarch64",
"product_id": "dtb-renesas-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-rockchip-4.12.14-95.29.1.aarch64",
"product_id": "dtb-rockchip-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-socionext-4.12.14-95.29.1.aarch64",
"product_id": "dtb-socionext-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-sprd-4.12.14-95.29.1.aarch64",
"product_id": "dtb-sprd-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-xilinx-4.12.14-95.29.1.aarch64",
"product_id": "dtb-xilinx-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-4.12.14-95.29.1.aarch64",
"product": {
"name": "dtb-zte-4.12.14-95.29.1.aarch64",
"product_id": "dtb-zte-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.29.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.29.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.29.1.aarch64",
"product_id": "kernel-default-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.29.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.29.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.29.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.29.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.29.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.29.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.29.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.29.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.29.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.29.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.29.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.29.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.29.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.29.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.29.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.29.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.29.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.29.1.noarch",
"product_id": "kernel-devel-4.12.14-95.29.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.29.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.29.1.noarch",
"product_id": "kernel-docs-4.12.14-95.29.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.29.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.29.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.29.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.29.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.29.1.noarch",
"product_id": "kernel-macros-4.12.14-95.29.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.29.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.29.1.noarch",
"product_id": "kernel-source-4.12.14-95.29.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.29.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.29.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.29.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.29.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.29.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.29.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.29.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.29.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.29.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.29.1.s390x",
"product_id": "kernel-default-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.29.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.29.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.29.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.29.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.29.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.29.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.29.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.29.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.29.1.s390x",
"product_id": "kernel-syms-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.29.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.29.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.29.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.29.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.29.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.29.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.29.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.29.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.29.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.29.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.29.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.29.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.29.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.29.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.29.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.29.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.29.1.x86_64",
"product_id": "kernel-default-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.29.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.29.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.29.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.29.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.29.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.29.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.29.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.29.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.29.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.29.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.29.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.29.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.29.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.29.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.29.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.29.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.29.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-95.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-95.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-20855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20855"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20855",
"url": "https://www.suse.com/security/cve/CVE-2018-20855"
},
{
"category": "external",
"summary": "SUSE Bug 1143045 for CVE-2018-20855",
"url": "https://bugzilla.suse.com/1143045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:10Z",
"details": "low"
}
],
"title": "CVE-2018-20855"
},
{
"cve": "CVE-2019-1125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1125"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1125",
"url": "https://www.suse.com/security/cve/CVE-2019-1125"
},
{
"category": "external",
"summary": "SUSE Bug 1139358 for CVE-2019-1125",
"url": "https://bugzilla.suse.com/1139358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-1125"
},
{
"cve": "CVE-2019-11810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11810"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11810",
"url": "https://www.suse.com/security/cve/CVE-2019-11810"
},
{
"category": "external",
"summary": "SUSE Bug 1134399 for CVE-2019-11810",
"url": "https://bugzilla.suse.com/1134399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:10Z",
"details": "low"
}
],
"title": "CVE-2019-11810"
},
{
"cve": "CVE-2019-13631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13631"
}
],
"notes": [
{
"category": "general",
"text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13631",
"url": "https://www.suse.com/security/cve/CVE-2019-13631"
},
{
"category": "external",
"summary": "SUSE Bug 1142023 for CVE-2019-13631",
"url": "https://bugzilla.suse.com/1142023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-13631"
},
{
"cve": "CVE-2019-13648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13648"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13648",
"url": "https://www.suse.com/security/cve/CVE-2019-13648"
},
{
"category": "external",
"summary": "SUSE Bug 1142254 for CVE-2019-13648",
"url": "https://bugzilla.suse.com/1142254"
},
{
"category": "external",
"summary": "SUSE Bug 1142265 for CVE-2019-13648",
"url": "https://bugzilla.suse.com/1142265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:10Z",
"details": "low"
}
],
"title": "CVE-2019-13648"
},
{
"cve": "CVE-2019-14283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14283",
"url": "https://www.suse.com/security/cve/CVE-2019-14283"
},
{
"category": "external",
"summary": "SUSE Bug 1143191 for CVE-2019-14283",
"url": "https://bugzilla.suse.com/1143191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-14283"
},
{
"cve": "CVE-2019-14284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14284",
"url": "https://www.suse.com/security/cve/CVE-2019-14284"
},
{
"category": "external",
"summary": "SUSE Bug 1143189 for CVE-2019-14284",
"url": "https://bugzilla.suse.com/1143189"
},
{
"category": "external",
"summary": "SUSE Bug 1143191 for CVE-2019-14284",
"url": "https://bugzilla.suse.com/1143191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-14284"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…