SUSE-SU-2019:2073-1
Vulnerability from csaf_suse - Published: 2019-08-06 22:52 - Updated: 2019-08-06 22:52Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch:
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).
- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
The following non-security bugs were fixed:
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- Add back sibling paca poiter to paca (bsc#1055117).
- Add support for crct10dif-vpmsum ().
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).
- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).
- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).
- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).
- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- asoc : cs4265 : readable register too low (bsc#1051510).
- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath10k: add missing error handling (bsc#1111666).
- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).
- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).
- ath10k: Do not send probe response template for mesh (bsc#1111666).
- ath10k: Fix encoding for protected management frames (bsc#1111666).
- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).
- ath10k: fix PCIE device wake up failed (bsc#1111666).
- ath6kl: add some bounds checking (bsc#1051510).
- ath9k: Check for errors when reading SREV register (bsc#1111666).
- ath9k: correctly handle short radar pulses (bsc#1111666).
- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Cap the returned MSIX vectors to the RDMA driver (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745).
- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).
- bpf: fix callees pruning callers (bsc#1109837).
- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- carl9170: fix misuse of device driver API (bsc#1111666).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- Correct iwlwifi 22000 series ucode file name (bsc#1142673)
- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).
- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).
- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drm/amd/display: Make some functions static (bsc#1111666).
- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).
- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).
- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).
- drm/udl: move to embedding drm device inside udl device (bsc#1111666).
- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).
- drm/vc4: fix fb references in async update (bsc#1141312).
- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- Enable intel-speed-select driver and update supported.conf (jsc#SLE-5364)
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).
- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).
- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).
- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).
- hid: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid: wacom: generic: Correct pad syncing (bsc#1051510).
- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).
- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).
- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- iwlwifi: correct one of the PCI struct names (bsc#1111666).
- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).
- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).
- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).
- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).
- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).
- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).
- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).
- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).
- kabi fix for hda_codec.relaxed_resume flag (bsc#1111666).
- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- mac80211: do not start any work during reconfigure flow (bsc#1111666).
- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).
- mac80211: free peer keys before vif down in mesh (bsc#1111666).
- mac80211: mesh: fix RCU warning (bsc#1111666).
- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).
- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).
- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net: hns3: Fix inconsistent indenting (bsc#1140676).
- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).
- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).
- net: hns: Fix loopback test failed at copper ports (bsc#1140676).
- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).
- net: hns: fix unsigned comparison to less than zero (bsc#1140676).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).
- net/tls: make sure offload also gets the keys wiped (bsc#1109837).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci/aer: Use cached AER Capability offset (bsc#1142623).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).
- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).
- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).
- pci/portdrv: Consolidate comments (bsc#1142623).
- pci/portdrv: Disable port driver in compat mode (bsc#1142623).
- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).
- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).
- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).
- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).
- pci: Return error if cannot probe VF (bsc#1051510).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via PCI (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).
- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).
- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).
- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).
- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).
- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).
- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).
- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).
- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).
- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).
- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).
- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).
- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).
- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).
- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).
- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).
- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).
- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).
- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).
- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).
- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).
- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).
- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).
- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).
- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst->atid (jsc#SLE-4678 bsc#1136342).
- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).
- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Prevent 'use after free' memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set but not used variable 'phys_id' (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).
- scsi: qedf: Add additional checks for io_req->sc_cmd validity (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add driver state to 'driver_stats' debugfs node (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Remove set but not used variable 'fr_len' (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).
- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Fix spelling mistake 'OUSTANDING' -> 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: remove set but not used variables 'cdev' and 'udev' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).
- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).
- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).
- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).
- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).
- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: drop old event after wmi_call timeout (bsc#1111666).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xdp: fix possible cq entry leak (bsc#1109837).
- xdp: fix race on generic receive path (bsc#1109837).
- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).
- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).
Patchnames: SUSE-2019-2073,SUSE-SLE-Module-Basesystem-15-SP1-2019-2073,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2073,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2073,SUSE-SLE-Module-Legacy-15-SP1-2019-2073,SUSE-SLE-Module-Live-Patching-15-SP1-2019-2073,SUSE-SLE-Product-HA-15-SP1-2019-2073,SUSE-SLE-Product-WE-15-SP1-2019-2073
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n\nThe following non-security bugs were fixed:\n\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Add support for crct10dif-vpmsum ().\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).\n- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).\n- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).\n- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).\n- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- asoc : cs4265 : readable register too low (bsc#1051510).\n- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath10k: add missing error handling (bsc#1111666).\n- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).\n- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).\n- ath10k: Do not send probe response template for mesh (bsc#1111666).\n- ath10k: Fix encoding for protected management frames (bsc#1111666).\n- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).\n- ath10k: fix PCIE device wake up failed (bsc#1111666).\n- ath6kl: add some bounds checking (bsc#1051510).\n- ath9k: Check for errors when reading SREV register (bsc#1111666).\n- ath9k: correctly handle short radar pulses (bsc#1111666).\n- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Cap the returned MSIX vectors to the RDMA driver (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745).\n- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).\n- bpf: fix callees pruning callers (bsc#1109837).\n- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- carl9170: fix misuse of device driver API (bsc#1111666).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- Correct iwlwifi 22000 series ucode file name (bsc#1142673)\n- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).\n- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drm/amd/display: Make some functions static (bsc#1111666).\n- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).\n- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).\n- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).\n- drm/udl: move to embedding drm device inside udl device (bsc#1111666).\n- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).\n- drm/vc4: fix fb references in async update (bsc#1141312).\n- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- Enable intel-speed-select driver and update supported.conf (jsc#SLE-5364)\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).\n- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).\n- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).\n- hid: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).\n- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).\n- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- iwlwifi: correct one of the PCI struct names (bsc#1111666).\n- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).\n- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).\n- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).\n- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).\n- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).\n- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).\n- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).\n- kabi fix for hda_codec.relaxed_resume flag (bsc#1111666).\n- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027 Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- mac80211: do not start any work during reconfigure flow (bsc#1111666).\n- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).\n- mac80211: free peer keys before vif down in mesh (bsc#1111666).\n- mac80211: mesh: fix RCU warning (bsc#1111666).\n- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).\n- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net: hns3: Fix inconsistent indenting (bsc#1140676).\n- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).\n- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).\n- net: hns: Fix loopback test failed at copper ports (bsc#1140676).\n- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).\n- net: hns: fix unsigned comparison to less than zero (bsc#1140676).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).\n- net/tls: make sure offload also gets the keys wiped (bsc#1109837).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci/aer: Use cached AER Capability offset (bsc#1142623).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).\n- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).\n- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).\n- pci/portdrv: Consolidate comments (bsc#1142623).\n- pci/portdrv: Disable port driver in compat mode (bsc#1142623).\n- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).\n- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).\n- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).\n- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via PCI (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).\n- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).\n- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).\n- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).\n- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).\n- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).\n- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).\n- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).\n- rds: ib: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995).\n- Revert \u0027serial: 8250: Do not service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).\n- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).\n- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).\n- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).\n- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).\n- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).\n- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).\n- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).\n- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).\n- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).\n- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst-\u003eatid (jsc#SLE-4678 bsc#1136342).\n- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Prevent \u0027use after free\u0027 memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set but not used variable \u0027phys_id\u0027 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).\n- scsi: qedf: Add additional checks for io_req-\u003esc_cmd validity (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add driver state to \u0027driver_stats\u0027 debugfs node (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Remove set but not used variable \u0027fr_len\u0027 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).\n- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Fix spelling mistake \u0027OUSTANDING\u0027 -\u003e \u0027OUTSTANDING\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: remove set but not used variables \u0027cdev\u0027 and \u0027udev\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).\n- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).\n- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: drop old event after wmi_call timeout (bsc#1111666).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xdp: fix possible cq entry leak (bsc#1109837).\n- xdp: fix race on generic receive path (bsc#1109837).\n- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).\n- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2073,SUSE-SLE-Module-Basesystem-15-SP1-2019-2073,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2073,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2073,SUSE-SLE-Module-Legacy-15-SP1-2019-2073,SUSE-SLE-Module-Live-Patching-15-SP1-2019-2073,SUSE-SLE-Product-HA-15-SP1-2019-2073,SUSE-SLE-Product-WE-15-SP1-2019-2073",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2073-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2073-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192073-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2073-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1083710",
"url": "https://bugzilla.suse.com/1083710"
},
{
"category": "self",
"summary": "SUSE Bug 1102247",
"url": "https://bugzilla.suse.com/1102247"
},
{
"category": "self",
"summary": "SUSE Bug 1103991",
"url": "https://bugzilla.suse.com/1103991"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112374",
"url": "https://bugzilla.suse.com/1112374"
},
{
"category": "self",
"summary": "SUSE Bug 1119222",
"url": "https://bugzilla.suse.com/1119222"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1127034",
"url": "https://bugzilla.suse.com/1127034"
},
{
"category": "self",
"summary": "SUSE Bug 1127315",
"url": "https://bugzilla.suse.com/1127315"
},
{
"category": "self",
"summary": "SUSE Bug 1127611",
"url": "https://bugzilla.suse.com/1127611"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1134090",
"url": "https://bugzilla.suse.com/1134090"
},
{
"category": "self",
"summary": "SUSE Bug 1134097",
"url": "https://bugzilla.suse.com/1134097"
},
{
"category": "self",
"summary": "SUSE Bug 1134390",
"url": "https://bugzilla.suse.com/1134390"
},
{
"category": "self",
"summary": "SUSE Bug 1134399",
"url": "https://bugzilla.suse.com/1134399"
},
{
"category": "self",
"summary": "SUSE Bug 1135335",
"url": "https://bugzilla.suse.com/1135335"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1136217",
"url": "https://bugzilla.suse.com/1136217"
},
{
"category": "self",
"summary": "SUSE Bug 1136342",
"url": "https://bugzilla.suse.com/1136342"
},
{
"category": "self",
"summary": "SUSE Bug 1136460",
"url": "https://bugzilla.suse.com/1136460"
},
{
"category": "self",
"summary": "SUSE Bug 1136461",
"url": "https://bugzilla.suse.com/1136461"
},
{
"category": "self",
"summary": "SUSE Bug 1136462",
"url": "https://bugzilla.suse.com/1136462"
},
{
"category": "self",
"summary": "SUSE Bug 1136467",
"url": "https://bugzilla.suse.com/1136467"
},
{
"category": "self",
"summary": "SUSE Bug 1137458",
"url": "https://bugzilla.suse.com/1137458"
},
{
"category": "self",
"summary": "SUSE Bug 1137534",
"url": "https://bugzilla.suse.com/1137534"
},
{
"category": "self",
"summary": "SUSE Bug 1137535",
"url": "https://bugzilla.suse.com/1137535"
},
{
"category": "self",
"summary": "SUSE Bug 1137584",
"url": "https://bugzilla.suse.com/1137584"
},
{
"category": "self",
"summary": "SUSE Bug 1137609",
"url": "https://bugzilla.suse.com/1137609"
},
{
"category": "self",
"summary": "SUSE Bug 1137811",
"url": "https://bugzilla.suse.com/1137811"
},
{
"category": "self",
"summary": "SUSE Bug 1137827",
"url": "https://bugzilla.suse.com/1137827"
},
{
"category": "self",
"summary": "SUSE Bug 1138874",
"url": "https://bugzilla.suse.com/1138874"
},
{
"category": "self",
"summary": "SUSE Bug 1139358",
"url": "https://bugzilla.suse.com/1139358"
},
{
"category": "self",
"summary": "SUSE Bug 1139619",
"url": "https://bugzilla.suse.com/1139619"
},
{
"category": "self",
"summary": "SUSE Bug 1140133",
"url": "https://bugzilla.suse.com/1140133"
},
{
"category": "self",
"summary": "SUSE Bug 1140139",
"url": "https://bugzilla.suse.com/1140139"
},
{
"category": "self",
"summary": "SUSE Bug 1140322",
"url": "https://bugzilla.suse.com/1140322"
},
{
"category": "self",
"summary": "SUSE Bug 1140559",
"url": "https://bugzilla.suse.com/1140559"
},
{
"category": "self",
"summary": "SUSE Bug 1140652",
"url": "https://bugzilla.suse.com/1140652"
},
{
"category": "self",
"summary": "SUSE Bug 1140676",
"url": "https://bugzilla.suse.com/1140676"
},
{
"category": "self",
"summary": "SUSE Bug 1140903",
"url": "https://bugzilla.suse.com/1140903"
},
{
"category": "self",
"summary": "SUSE Bug 1140945",
"url": "https://bugzilla.suse.com/1140945"
},
{
"category": "self",
"summary": "SUSE Bug 1140948",
"url": "https://bugzilla.suse.com/1140948"
},
{
"category": "self",
"summary": "SUSE Bug 1141312",
"url": "https://bugzilla.suse.com/1141312"
},
{
"category": "self",
"summary": "SUSE Bug 1141401",
"url": "https://bugzilla.suse.com/1141401"
},
{
"category": "self",
"summary": "SUSE Bug 1141402",
"url": "https://bugzilla.suse.com/1141402"
},
{
"category": "self",
"summary": "SUSE Bug 1141452",
"url": "https://bugzilla.suse.com/1141452"
},
{
"category": "self",
"summary": "SUSE Bug 1141453",
"url": "https://bugzilla.suse.com/1141453"
},
{
"category": "self",
"summary": "SUSE Bug 1141454",
"url": "https://bugzilla.suse.com/1141454"
},
{
"category": "self",
"summary": "SUSE Bug 1141478",
"url": "https://bugzilla.suse.com/1141478"
},
{
"category": "self",
"summary": "SUSE Bug 1141558",
"url": "https://bugzilla.suse.com/1141558"
},
{
"category": "self",
"summary": "SUSE Bug 1142023",
"url": "https://bugzilla.suse.com/1142023"
},
{
"category": "self",
"summary": "SUSE Bug 1142052",
"url": "https://bugzilla.suse.com/1142052"
},
{
"category": "self",
"summary": "SUSE Bug 1142083",
"url": "https://bugzilla.suse.com/1142083"
},
{
"category": "self",
"summary": "SUSE Bug 1142112",
"url": "https://bugzilla.suse.com/1142112"
},
{
"category": "self",
"summary": "SUSE Bug 1142115",
"url": "https://bugzilla.suse.com/1142115"
},
{
"category": "self",
"summary": "SUSE Bug 1142119",
"url": "https://bugzilla.suse.com/1142119"
},
{
"category": "self",
"summary": "SUSE Bug 1142220",
"url": "https://bugzilla.suse.com/1142220"
},
{
"category": "self",
"summary": "SUSE Bug 1142221",
"url": "https://bugzilla.suse.com/1142221"
},
{
"category": "self",
"summary": "SUSE Bug 1142254",
"url": "https://bugzilla.suse.com/1142254"
},
{
"category": "self",
"summary": "SUSE Bug 1142350",
"url": "https://bugzilla.suse.com/1142350"
},
{
"category": "self",
"summary": "SUSE Bug 1142351",
"url": "https://bugzilla.suse.com/1142351"
},
{
"category": "self",
"summary": "SUSE Bug 1142354",
"url": "https://bugzilla.suse.com/1142354"
},
{
"category": "self",
"summary": "SUSE Bug 1142359",
"url": "https://bugzilla.suse.com/1142359"
},
{
"category": "self",
"summary": "SUSE Bug 1142450",
"url": "https://bugzilla.suse.com/1142450"
},
{
"category": "self",
"summary": "SUSE Bug 1142623",
"url": "https://bugzilla.suse.com/1142623"
},
{
"category": "self",
"summary": "SUSE Bug 1142673",
"url": "https://bugzilla.suse.com/1142673"
},
{
"category": "self",
"summary": "SUSE Bug 1142701",
"url": "https://bugzilla.suse.com/1142701"
},
{
"category": "self",
"summary": "SUSE Bug 1142868",
"url": "https://bugzilla.suse.com/1142868"
},
{
"category": "self",
"summary": "SUSE Bug 1143003",
"url": "https://bugzilla.suse.com/1143003"
},
{
"category": "self",
"summary": "SUSE Bug 1143045",
"url": "https://bugzilla.suse.com/1143045"
},
{
"category": "self",
"summary": "SUSE Bug 1143105",
"url": "https://bugzilla.suse.com/1143105"
},
{
"category": "self",
"summary": "SUSE Bug 1143185",
"url": "https://bugzilla.suse.com/1143185"
},
{
"category": "self",
"summary": "SUSE Bug 1143189",
"url": "https://bugzilla.suse.com/1143189"
},
{
"category": "self",
"summary": "SUSE Bug 1143191",
"url": "https://bugzilla.suse.com/1143191"
},
{
"category": "self",
"summary": "SUSE Bug 1143209",
"url": "https://bugzilla.suse.com/1143209"
},
{
"category": "self",
"summary": "SUSE Bug 1143507",
"url": "https://bugzilla.suse.com/1143507"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20855 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1125 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11810 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13631 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13648 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14283 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14284 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14284/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-08-06T22:52:42Z",
"generator": {
"date": "2019-08-06T22:52:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2073-1",
"initial_release_date": "2019-08-06T22:52:42Z",
"revision_history": [
{
"date": "2019-08-06T22:52:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.15.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.15.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-al-4.12.14-197.15.1.aarch64",
"product_id": "dtb-al-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-allwinner-4.12.14-197.15.1.aarch64",
"product_id": "dtb-allwinner-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-altera-4.12.14-197.15.1.aarch64",
"product_id": "dtb-altera-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-amd-4.12.14-197.15.1.aarch64",
"product_id": "dtb-amd-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-amlogic-4.12.14-197.15.1.aarch64",
"product_id": "dtb-amlogic-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-apm-4.12.14-197.15.1.aarch64",
"product_id": "dtb-apm-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-arm-4.12.14-197.15.1.aarch64",
"product_id": "dtb-arm-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-broadcom-4.12.14-197.15.1.aarch64",
"product_id": "dtb-broadcom-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-cavium-4.12.14-197.15.1.aarch64",
"product_id": "dtb-cavium-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-exynos-4.12.14-197.15.1.aarch64",
"product_id": "dtb-exynos-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-freescale-4.12.14-197.15.1.aarch64",
"product_id": "dtb-freescale-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-hisilicon-4.12.14-197.15.1.aarch64",
"product_id": "dtb-hisilicon-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-lg-4.12.14-197.15.1.aarch64",
"product_id": "dtb-lg-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-marvell-4.12.14-197.15.1.aarch64",
"product_id": "dtb-marvell-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-mediatek-4.12.14-197.15.1.aarch64",
"product_id": "dtb-mediatek-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-nvidia-4.12.14-197.15.1.aarch64",
"product_id": "dtb-nvidia-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-qcom-4.12.14-197.15.1.aarch64",
"product_id": "dtb-qcom-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-renesas-4.12.14-197.15.1.aarch64",
"product_id": "dtb-renesas-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-rockchip-4.12.14-197.15.1.aarch64",
"product_id": "dtb-rockchip-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-socionext-4.12.14-197.15.1.aarch64",
"product_id": "dtb-socionext-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-sprd-4.12.14-197.15.1.aarch64",
"product_id": "dtb-sprd-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-xilinx-4.12.14-197.15.1.aarch64",
"product_id": "dtb-xilinx-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-4.12.14-197.15.1.aarch64",
"product": {
"name": "dtb-zte-4.12.14-197.15.1.aarch64",
"product_id": "dtb-zte-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-197.15.1.aarch64",
"product_id": "kernel-default-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-197.15.1.aarch64",
"product_id": "kernel-default-base-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-197.15.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-197.15.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.15.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-197.15.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.15.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-197.15.1.aarch64",
"product_id": "kernel-syms-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.15.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.15.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.15.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.15.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.15.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-197.15.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-197.15.1.noarch",
"product_id": "kernel-devel-4.12.14-197.15.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-197.15.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-197.15.1.noarch",
"product_id": "kernel-docs-4.12.14-197.15.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-197.15.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-197.15.1.noarch",
"product_id": "kernel-docs-html-4.12.14-197.15.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-197.15.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-197.15.1.noarch",
"product_id": "kernel-macros-4.12.14-197.15.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-197.15.1.noarch",
"product": {
"name": "kernel-source-4.12.14-197.15.1.noarch",
"product_id": "kernel-source-4.12.14-197.15.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-197.15.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-197.15.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-197.15.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-debug-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-default-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-syms-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.15.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.15.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.15.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-197.15.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.15.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.15.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-default-4.12.14-197.15.1.s390x",
"product_id": "kernel-default-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-197.15.1.s390x",
"product_id": "kernel-default-base-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-197.15.1.s390x",
"product_id": "kernel-default-devel-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-197.15.1.s390x",
"product_id": "kernel-default-extra-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.15.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.15.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-197.15.1.s390x",
"product_id": "kernel-obs-build-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-197.15.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-197.15.1.s390x",
"product_id": "kernel-syms-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.15.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.15.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.15.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-197.15.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.15.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.15.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.15.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.15.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-197.15.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-197.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.15.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.15.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-197.15.1.x86_64",
"product_id": "kernel-debug-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.15.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-197.15.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.15.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-197.15.1.x86_64",
"product_id": "kernel-default-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-197.15.1.x86_64",
"product_id": "kernel-default-base-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-197.15.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-197.15.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-197.15.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.15.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-197.15.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.15.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-197.15.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.15.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-197.15.1.x86_64",
"product_id": "kernel-syms-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.15.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.15.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.15.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.15.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.15.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x"
},
"product_reference": "kernel-zfcpdump-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.15.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.15.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-197.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-20855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20855"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20855",
"url": "https://www.suse.com/security/cve/CVE-2018-20855"
},
{
"category": "external",
"summary": "SUSE Bug 1143045 for CVE-2018-20855",
"url": "https://bugzilla.suse.com/1143045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:42Z",
"details": "low"
}
],
"title": "CVE-2018-20855"
},
{
"cve": "CVE-2019-1125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1125"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1125",
"url": "https://www.suse.com/security/cve/CVE-2019-1125"
},
{
"category": "external",
"summary": "SUSE Bug 1139358 for CVE-2019-1125",
"url": "https://bugzilla.suse.com/1139358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:42Z",
"details": "moderate"
}
],
"title": "CVE-2019-1125"
},
{
"cve": "CVE-2019-11810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11810"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11810",
"url": "https://www.suse.com/security/cve/CVE-2019-11810"
},
{
"category": "external",
"summary": "SUSE Bug 1134399 for CVE-2019-11810",
"url": "https://bugzilla.suse.com/1134399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:42Z",
"details": "low"
}
],
"title": "CVE-2019-11810"
},
{
"cve": "CVE-2019-13631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13631"
}
],
"notes": [
{
"category": "general",
"text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13631",
"url": "https://www.suse.com/security/cve/CVE-2019-13631"
},
{
"category": "external",
"summary": "SUSE Bug 1142023 for CVE-2019-13631",
"url": "https://bugzilla.suse.com/1142023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:42Z",
"details": "moderate"
}
],
"title": "CVE-2019-13631"
},
{
"cve": "CVE-2019-13648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13648"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13648",
"url": "https://www.suse.com/security/cve/CVE-2019-13648"
},
{
"category": "external",
"summary": "SUSE Bug 1142254 for CVE-2019-13648",
"url": "https://bugzilla.suse.com/1142254"
},
{
"category": "external",
"summary": "SUSE Bug 1142265 for CVE-2019-13648",
"url": "https://bugzilla.suse.com/1142265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:42Z",
"details": "low"
}
],
"title": "CVE-2019-13648"
},
{
"cve": "CVE-2019-14283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14283",
"url": "https://www.suse.com/security/cve/CVE-2019-14283"
},
{
"category": "external",
"summary": "SUSE Bug 1143191 for CVE-2019-14283",
"url": "https://bugzilla.suse.com/1143191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:42Z",
"details": "moderate"
}
],
"title": "CVE-2019-14283"
},
{
"cve": "CVE-2019-14284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14284",
"url": "https://www.suse.com/security/cve/CVE-2019-14284"
},
{
"category": "external",
"summary": "SUSE Bug 1143189 for CVE-2019-14284",
"url": "https://bugzilla.suse.com/1143189"
},
{
"category": "external",
"summary": "SUSE Bug 1143191 for CVE-2019-14284",
"url": "https://bugzilla.suse.com/1143191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-06T22:52:42Z",
"details": "moderate"
}
],
"title": "CVE-2019-14284"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…