SUSE-SU-2021:0095-1

Vulnerability from csaf_suse - Published: 2021-01-12 18:14 - Updated: 2021-01-12 18:14
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559). - CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960). - CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031). - CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086). - CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029). - CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027). - CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745). - CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745). - CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107). The following non-security bugs were fixed: - ACPI: PNP: compare the string length in the matching_id() (git-fixes). - ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes). - ACPICA: Do not increment operation_region reference counts for field units (git-fixes). - ALSA: ca0106: fix error code handling (git-fixes). - ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes). - ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes). - ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes). - ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes). - ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes). - ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes). - ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes). - ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes). - ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes). - ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes). - ALSA: hda: Fix potential race in unsol event handler (git-fixes). - ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes). - ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes). - ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes). - ALSA: line6: Perform sanity check for each URB creation (git-fixes). - ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes). - ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes). - ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes). - ALSA: timer: Limit max amount of slave instances (git-fixes). - ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes). - ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes). - ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes). - ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes). - ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes). - ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes). - ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes). - ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes). - ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes). - ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes). - ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes). - ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes). - ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes). - ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes). - ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes). - ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes). - ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes). - ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes). - ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes). - ASoC: pcm3168a: The codec does not support S32_LE (git-fixes). - ASoC: pcm: DRAIN support reactivation (git-fixes). - ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes). - ASoC: sti: fix possible sleep-in-atomic (git-fixes). - ASoC: wm8904: fix regcache handling (git-fixes). - ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes). - ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes). - ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes). - ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes). - ath10k: Fix an error handling path (git-fixes). - ath10k: fix backtrace on coredump (git-fixes). - ath10k: fix get invalid tx rate for Mesh metric (git-fixes). - ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes). - ath10k: Release some resources in an error handling path (git-fixes). - ath10k: Remove msdu from idr when management pkt send fails (git-fixes). - ath6kl: fix enum-conversion warning (git-fixes). - ath9k_htc: Discard undersized packets (git-fixes). - ath9k_htc: Modify byte order for an error message (git-fixes). - ath9k_htc: Silence undersized packet warnings (git-fixes). - ath9k_htc: Use appropriate rs_datalen type (git-fixes). - backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes). - Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes). - Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes). - Bluetooth: Fix advertising duplicated flags (git-fixes). - Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes). - Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes). - btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963). - btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784). - bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes). - can: mcp251x: add error check when wq alloc failed (git-fixes). - can: softing: softing_netdev_open(): fix error handling (git-fixes). - cfg80211: initialize rekey_data (git-fixes). - cfg80211: regulatory: Fix inconsistent format argument (git-fixes). - cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes). - cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes). - clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes). - clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes). - clk: qcom: Allow constant ratio freq tables for rcg (git-fixes). - clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes). - clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes). - clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes). - clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes). - clk: tegra: Fix duplicated SE clock entry (git-fixes). - clk: tegra: Fix Tegra PMC clock out parents (git-fixes). - clk: ti: composite: fix memory leak (git-fixes). - clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes). - clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes). - clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes). - cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes). - cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes). - cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes). - cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes). - crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes). - crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes). - crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes). - crypto: talitos - Fix return type of current_desc_hdr() (git-fixes). - cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes). - drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes). - drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes). - drm/amd/display: remove useless if/else (git-fixes). - drm/amdgpu: fix build_coefficients() argument (git-fixes). - drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes). - drm/gma500: fix double free of gma_connector (git-fixes). - drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes). - drm/msm/dpu: Add newline to printks (git-fixes). - drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes). - drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes). - drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes). - epoll: Keep a reference on files added to the check list (bsc#1180031). - extcon: max77693: Fix modalias string (git-fixes). - firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes). - fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes). - forcedeth: use per cpu to collect xmit/recv statistics (git-fixes). - geneve: change from tx_error to tx_dropped on missing metadata (git-fixes). - genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729). - gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes). - gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes). - gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes). - gpio: max77620: Fixup debounce delays (git-fixes). - gpio: max77620: Use correct unit for debounce times (git-fixes). - gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes). - gpio: mvebu: fix potential user-after-free on probe (git-fixes). - gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes). - gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes). - gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes). - gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes). - gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes). - gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes). - gpiolib: fix up emulated open drain outputs (git-fixes). - HID: Add another Primax PIXART OEM mouse quirk (git-fixes). - HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes). - HID: core: check whether Usage Page item is after Usage ID items (git-fixes). - HID: core: Correctly handle ReportSize being zero (git-fixes). - HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes). - HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052). - HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes). - HID: Improve Windows Precision Touchpad detection (git-fixes). - HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes). - HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes). - HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes). - hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes). - hwmon: (jc42) Fix name to have no illegal characters (git-fixes). - i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes). - i2c: i801: Fix resume bug (git-fixes). - i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes). - i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes). - i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes). - ibmvnic: add some debugs (bsc#1179896 ltc#190255). - ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes). - ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes). - ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes). - ibmvnic: enhance resetting status check during module exit (bsc#1065729). - ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes). - ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes). - ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes). - ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes). - ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes). - iio: adc: max1027: Reset the device at probe time (git-fixes). - iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes). - iio: bmp280: fix compensation of humidity (git-fixes). - iio: buffer: Fix demux update (git-fixes). - iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes). - iio: fix center temperature of bmc150-accel-core (git-fixes). - iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes). - iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes). - iio: srf04: fix wrong limitation in distance measuring (git-fixes). - iio:imu:bmi160: Fix too large a buffer (git-fixes). - iio:pressure:mpl3115: Force alignment of buffer (git-fixes). - inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes). - Input: ads7846 - fix integer overflow on Rt calculation (git-fixes). - Input: ads7846 - fix race that causes missing releases (git-fixes). - Input: ads7846 - fix unaligned access on 7845 (git-fixes). - Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes). - Input: cm109 - do not stomp on control URB (git-fixes). - Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes). - Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes). - Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes). - Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes). - Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes). - Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes). - Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes). - Input: omap4-keypad - fix runtime PM error handling (git-fixes). - Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes). - Input: trackpoint - add new trackpoint variant IDs (git-fixes). - Input: trackpoint - enable Synaptics trackpoints (git-fixes). - Input: xpad - support Ardwiino Controllers (git-fixes). - ipw2x00: Fix -Wcast-function-type (git-fixes). - irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes). - iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes). - iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes). - iwlwifi: pcie: limit memory read spin time (git-fixes). - kABI workaround for dsa/b53 changes (git-fixes). - kABI workaround for HD-audio generic parser (git-fixes). - kABI workaround for net/ipvlan changes (git-fixes). - kABI: ath10k: move a new structure member to the end (git-fixes). - kABI: genirq: add back irq_create_mapping (bsc#1065729). - kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install - kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082) - KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178). - mac80211: allow rx of mesh eapol frames with default rx key (git-fixes). - mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes). - mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes). - mac80211: fix authentication with iwlwifi/mvm (git-fixes). - mac80211: fix use of skb payload instead of header (git-fixes). - mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes). - matroxfb: avoid -Warray-bounds warning (git-fixes). - md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727). - md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727). - md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727). - md/bitmap: fix memory leak of temporary bitmap (bsc#1163727). - md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727). - md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727). - md/cluster: block reshape with remote resync job (bsc#1163727). - md/cluster: fix deadlock when node is doing resync job (bsc#1163727). - md/raid5: fix oops during stripe resizing (git-fixes). - media: am437x-vpfe: Setting STD to current value is not an error (git-fixes). - media: cec-funcs.h: add status_req checks (git-fixes). - media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes). - media: gspca: Fix memory leak in probe (git-fixes). - media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes). - media: i2c: ov2659: Fix missing 720p register config (git-fixes). - media: i2c: ov2659: fix s_stream return value (git-fixes). - media: msi2500: assign SPI bus number dynamically (git-fixes). - media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes). - media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches). - media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes). - media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes). - media: si470x-i2c: add missed operations in remove (git-fixes). - media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes). - media: solo6x10: fix missing snd_card_free in error handling case (git-fixes). - media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes). - media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes). - media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes). - media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes). - media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes). - media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes). - media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes). - media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes). - media: v4l2-async: Fix trivial documentation typo (git-fixes). - media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes). - media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes). - mei: bus: do not clean driver pointer (git-fixes). - mei: protect mei_cl_mtu from null dereference (git-fixes). - memstick: fix a double-free bug in memstick_check (git-fixes). - memstick: r592: Fix error return in r592_probe() (git-fixes). - mfd: rt5033: Fix errorneous defines (git-fixes). - mfd: wm8994: Fix driver operation if loaded as modules (git-fixes). - mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258). - Move upstreamed bt fixes into sorted section - mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes). - net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes). - net: aquantia: fix LRO with FCS error (git-fixes). - net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes). - net: dsa: b53: Ensure the default VID is untagged (git-fixes). - net: dsa: b53: Fix default VLAN ID (git-fixes). - net: dsa: b53: Properly account for VLAN filtering (git-fixes). - net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes). - net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes). - net: dsa: qca8k: remove leftover phy accessors (git-fixes). - net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes). - net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes). - net: macb: add missing barriers when reading descriptors (git-fixes). - net: macb: fix dropped RX frames due to a race (git-fixes). - net: macb: fix error format in dev_err() (git-fixes). - net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes). - net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes). - net: phy: Avoid multiple suspends (git-fixes). - net: seeq: Fix the function used to release some memory in an error handling path (git-fixes). - net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes). - net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes). - net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes). - net: stmmac: fix csr_clk can't be zero issue (git-fixes). - net: stmmac: Fix reception of Broadcom switches tags (git-fixes). - net: usb: sr9800: fix uninitialized local variable (git-fixes). - net:ethernet:aquantia: Extra spinlocks removed (git-fixes). - nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes). - nfc: s3fwrn5: Release the nfc firmware (git-fixes). - nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes). - NFS: fix nfs_path in case of a rename retry (git-fixes). - NFSD: Add missing NFSv2 .pc_func methods (git-fixes). - NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes). - NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes). - ocfs2: fix unbalanced locking (bsc#1180506). - orinoco: Move context allocation after processing the skb (git-fixes). - parport: load lowlevel driver if ports not found (git-fixes). - PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes). - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes). - PCI: Do not disable decoding when mmio_always_on is set (git-fixes). - PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes). - phy: Revert toggling reset changes (git-fixes). - pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes). - pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes). - pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes). - pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes). - pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes). - pinctrl: merrifield: Set default bias in case no particular value given (git-fixes). - pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes). - platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes). - platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes). - platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes). - platform/x86: mlx-platform: remove an unused variable (git-fixes). - platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes). - platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes). - PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes). - PM: ACPI: Output correct message on target power state (git-fixes). - PM: hibernate: Freeze kernel threads in software_resume() (git-fixes). - PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes). - pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes). - power: supply: bq24190_charger: fix reference leak (git-fixes). - power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes). - powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729). - powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253). - powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). - powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630). - powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes). - powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630). - powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630). - powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes). - powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729). - powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes). - powerpc/xmon: Change printk() to pr_cont() (bsc#1065729). - powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630). - powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729). - ppp: remove the PPPIOCDETACH ioctl (git-fixes). - pwm: lp3943: Dynamically allocate PWM chip base (git-fixes). - radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes). - ravb: Fix use-after-free ravb_tstamp_skb (git-fixes). - regmap: debugfs: check count when read regmap file (git-fixes). - regmap: dev_get_regmap_match(): fix string comparison (git-fixes). - regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes). - regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes). - regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes). - regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes). - remoteproc: Fix wrong rvring index computation (git-fixes). - rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes). - rtc: 88pm860x: fix possible race condition (git-fixes). - rtc: hym8563: enable wakeup when applicable (git-fixes). - rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes). - rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes). - s390/dasd: fix hanging device offline processing (bsc#1144912). - scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section - scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780). - scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780). - scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780). - scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780). - scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780). - scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780). - scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780). - scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780). - scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780). - scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780). - scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780). - scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780). - scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780). - scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780). - scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780). - scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780). - scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780). - scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780). - scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780). - scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780). - scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780). - scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780). - scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780). - scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780). - scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780). - scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780). - scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780). - scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780). - scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780). - scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780). - scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780). - scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780). - scsi: lpfc: Reject CT request for MIB commands (bsc#1164780). - scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780). - scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780). - scsi: lpfc: Remove set but not used 'qp' (bsc#1164780). - scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780). - scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780). - scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780). - scsi: lpfc: Rework remote port lock handling (bsc#1164780). - scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780). - scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780). - scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780). - scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780). - scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780). - scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780). - scsi: lpfc: Use generic power management (bsc#1164780). - scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810). - scsi: Remove unneeded break statements (bsc#1164780). - scsi: storvsc: Fix error return in storvsc_probe() (git-fixes). - scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810). - serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes). - serial: 8250_pci: Add Realtek 816a and 816b (git-fixes). - serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes). - serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes). - serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes). - serial_core: Check for port state when tty is in error state (git-fixes). - soc/tegra: fuse: Fix index bug in get_process_id (git-fixes). - soc: imx: gpc: fix power up sequencing (git-fixes). - soc: mediatek: Check if power domains can be powered on at boot time (git-fixes). - soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes). - soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes). - soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes). - spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes). - spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes). - spi: davinci: Fix use-after-free on unbind (git-fixes). - spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes). - spi: dw: Fix Rx-only DMA transfers (git-fixes). - spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes). - spi: Fix memory leak on splited transfers (git-fixes). - spi: img-spfi: fix potential double release (git-fixes). - spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes). - spi: pic32: Do not leak DMA channels in probe error path (git-fixes). - spi: pxa2xx: Add missed security checks (git-fixes). - spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes). - spi: spi-loopback-test: Fix out-of-bounds read (git-fixes). - spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes). - spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes). - spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes). - spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes). - spi: st-ssc4: add missed pm_runtime_disable (git-fixes). - spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes). - spi: tegra114: fix reference leak in tegra spi ops (git-fixes). - spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes). - spi: tegra20-slink: add missed clk_unprepare (git-fixes). - spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes). - staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes). - staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes). - staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes). - staging: olpc_dcon: add a missing dependency (git-fixes). - staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes). - staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes). - staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes). - staging: rtl8188eu: fix possible null dereference (git-fixes). - staging: rtl8192u: fix multiple memory leaks on error path (git-fixes). - staging: vt6656: set usb_set_intfdata on driver fail (git-fixes). - staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes). - staging: wlan-ng: properly check endpoint types (git-fixes). - sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes). - SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes). - SUNRPC: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes). - thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes). - timer: Fix wheel index calculation on last level (git fixes) - timer: Prevent base->clk from moving backward (git-fixes) - tty: always relink the port (git-fixes). - tty: link tty and port before configuring it as console (git-fixes). - tty: synclink_gt: Adjust indentation in several functions (git-fixes). - tty: synclinkmp: Adjust indentation in several functions (git-fixes). - tty:serial:mvebu-uart:fix a wrong return (git-fixes). - uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes). - uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes). - usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes). - usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes). - usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes). - usb: dwc2: Fix IN FIFO allocation (git-fixes). - usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes). - usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes). - usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes). - usb: fsl: Check memory resource before releasing it (git-fixes). - usb: gadget: composite: Fix possible double free memory bug (git-fixes). - usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes). - usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes). - usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes). - usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes). - usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes). - usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes). - usb: gadget: fix wrong endpoint desc (git-fixes). - usb: gadget: goku_udc: fix potential crashes in probe (git-fixes). - usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes). - usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes). - usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes). - usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes). - usb: hso: Fix debug compile warning on sparc32 (git-fixes). - usb: ldusb: use unsigned size format specifiers (git-fixes). - usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes). - usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes). - usb: serial: ch341: add new Product ID for CH341A (git-fixes). - usb: serial: ch341: sort device-id entries (git-fixes). - usb: serial: digi_acceleport: clean up modem-control handling (git-fixes). - usb: serial: digi_acceleport: clean up set_termios (git-fixes). - usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes). - usb: serial: digi_acceleport: remove in_interrupt() usage. - usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes). - usb: serial: digi_acceleport: rename tty flag variable (git-fixes). - usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes). - usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes). - usb: serial: keyspan_pda: fix stalled writes (git-fixes). - usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes). - usb: serial: keyspan_pda: fix write deadlock (git-fixes). - usb: serial: keyspan_pda: fix write unthrottling (git-fixes). - usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes). - usb: serial: mos7720: fix parallel-port state restore (git-fixes). - usb: serial: option: add Fibocom NL668 variants (git-fixes). - usb: serial: option: add interface-number sanity check to flag handling (git-fixes). - usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes). - usb: Skip endpoints with 0 maxpacket length (git-fixes). - usb: UAS: introduce a quirk to set no_write_same (git-fixes). - usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes). - usblp: poison URBs upon disconnect (git-fixes). - usbnet: ipheth: fix connectivity with iOS 14 (git-fixes). - video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes). - vt: do not hardcode the mem allocation upper bound (git-fixes). - vt: Reject zero-sized screen buffer size (git-fixes). - watchdog: coh901327: add COMMON_CLK dependency (git-fixes). - watchdog: da9062: do not ping the hw during stop() (git-fixes). - watchdog: da9062: No need to ping manually before setting timeout (git-fixes). - watchdog: qcom: Avoid context switch in restart handler (git-fixes). - watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes). - wimax: fix duplicate initializer warning (git-fixes). - wireless: Use linux/stddef.h instead of stddef.h (git-fixes). - wireless: Use offsetof instead of custom macro (git-fixes). - x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178). - x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178). - x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178). - x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178). - x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178). - x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178). - x86/tracing: Introduce a static key for exception tracing (bsc#1179895). - x86/traps: Simplify pagefault tracing logic (bsc#1179895). - x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178). - xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes). - xprtrdma: fix incorrect header size calculations (git-fixes).
Patchnames: SUSE-2021-95,SUSE-SLE-Module-RT-15-SP1-2021-95
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/1040855 self
https://bugzilla.suse.com/1044120 self
https://bugzilla.suse.com/1044767 self
https://bugzilla.suse.com/1055117 self
https://bugzilla.suse.com/1065729 self
https://bugzilla.suse.com/1094840 self
https://bugzilla.suse.com/1109695 self
https://bugzilla.suse.com/1112178 self
https://bugzilla.suse.com/1115431 self
https://bugzilla.suse.com/1138374 self
https://bugzilla.suse.com/1144912 self
https://bugzilla.suse.com/1152457 self
https://bugzilla.suse.com/1163727 self
https://bugzilla.suse.com/1164780 self
https://bugzilla.suse.com/1171078 self
https://bugzilla.suse.com/1172145 self
https://bugzilla.suse.com/1172538 self
https://bugzilla.suse.com/1174784 self
https://bugzilla.suse.com/1178401 self
https://bugzilla.suse.com/1178762 self
https://bugzilla.suse.com/1179014 self
https://bugzilla.suse.com/1179015 self
https://bugzilla.suse.com/1179045 self
https://bugzilla.suse.com/1179082 self
https://bugzilla.suse.com/1179107 self
https://bugzilla.suse.com/1179142 self
https://bugzilla.suse.com/1179419 self
https://bugzilla.suse.com/1179444 self
https://bugzilla.suse.com/1179745 self
https://bugzilla.suse.com/1179810 self
https://bugzilla.suse.com/1179888 self
https://bugzilla.suse.com/1179895 self
https://bugzilla.suse.com/1179896 self
https://bugzilla.suse.com/1179960 self
https://bugzilla.suse.com/1179963 self
https://bugzilla.suse.com/1180027 self
https://bugzilla.suse.com/1180029 self
https://bugzilla.suse.com/1180031 self
https://bugzilla.suse.com/1180052 self
https://bugzilla.suse.com/1180086 self
https://bugzilla.suse.com/1180117 self
https://bugzilla.suse.com/1180258 self
https://bugzilla.suse.com/1180506 self
https://bugzilla.suse.com/1180559 self
https://www.suse.com/security/cve/CVE-2020-0444/ self
https://www.suse.com/security/cve/CVE-2020-0465/ self
https://www.suse.com/security/cve/CVE-2020-0466/ self
https://www.suse.com/security/cve/CVE-2020-27068/ self
https://www.suse.com/security/cve/CVE-2020-27777/ self
https://www.suse.com/security/cve/CVE-2020-27825/ self
https://www.suse.com/security/cve/CVE-2020-29660/ self
https://www.suse.com/security/cve/CVE-2020-29661/ self
https://www.suse.com/security/cve/CVE-2020-36158/ self
https://www.suse.com/security/cve/CVE-2020-0444 external
https://bugzilla.suse.com/1180027 external
https://bugzilla.suse.com/1180028 external
https://www.suse.com/security/cve/CVE-2020-0465 external
https://bugzilla.suse.com/1180029 external
https://bugzilla.suse.com/1180030 external
https://www.suse.com/security/cve/CVE-2020-0466 external
https://bugzilla.suse.com/1180031 external
https://bugzilla.suse.com/1180032 external
https://bugzilla.suse.com/1199255 external
https://bugzilla.suse.com/1200084 external
https://www.suse.com/security/cve/CVE-2020-27068 external
https://bugzilla.suse.com/1180086 external
https://www.suse.com/security/cve/CVE-2020-27777 external
https://bugzilla.suse.com/1179107 external
https://bugzilla.suse.com/1179419 external
https://bugzilla.suse.com/1200343 external
https://bugzilla.suse.com/1220060 external
https://www.suse.com/security/cve/CVE-2020-27825 external
https://bugzilla.suse.com/1179960 external
https://bugzilla.suse.com/1179961 external
https://www.suse.com/security/cve/CVE-2020-29660 external
https://bugzilla.suse.com/1179745 external
https://bugzilla.suse.com/1179877 external
https://www.suse.com/security/cve/CVE-2020-29661 external
https://bugzilla.suse.com/1179745 external
https://bugzilla.suse.com/1179877 external
https://bugzilla.suse.com/1214268 external
https://bugzilla.suse.com/1218966 external
https://www.suse.com/security/cve/CVE-2020-36158 external
https://bugzilla.suse.com/1180559 external
https://bugzilla.suse.com/1180562 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).\n- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).\n- ALSA: ca0106: fix error code handling (git-fixes).\n- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).\n- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).\n- ALSA: hda/realtek - Couldn\u0027t detect Mic if booting with headset plugged (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).\n- ALSA: hda: Add NVIDIA codec IDs 9a \u0026 9d through a0 to patch table (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).\n- ALSA: timer: Limit max amount of slave instances (git-fixes).\n- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).\n- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Fix control \u0027access overflow\u0027 errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).\n- ASoC: sti: fix possible sleep-in-atomic (git-fixes).\n- ASoC: wm8904: fix regcache handling (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).\n- ASoC: wm_adsp: remove \u0027ctl\u0027 from list on error in wm_adsp_create_control() (git-fixes).\n- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: fix backtrace on coredump (git-fixes).\n- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).\n- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- ath9k_htc: Discard undersized packets (git-fixes).\n- ath9k_htc: Modify byte order for an error message (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).\n- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).\n- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).\n- Bluetooth: Fix advertising duplicated flags (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: mcp251x: add error check when wq alloc failed (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).\n- cirrus: cs89x0: remove set but not used variable \u0027lp\u0027 (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).\n- clk: qcom: msm8916: Fix the address location of pll-\u003econfig_reg (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).\n- clk: ti: composite: fix memory leak (git-fixes).\n- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- extcon: max77693: Fix modalias string (git-fixes).\n- firmware: qcom: scm: Ensure \u0027a0\u0027 status code is treated as signed (git-fixes).\n- fix regression in \u0027epoll: Keep a reference on files added to the check list\u0027 (bsc#1180031, git-fixes).\n- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).\n- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).\n- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).\n- gpio: max77620: Fixup debounce delays (git-fixes).\n- gpio: max77620: Use correct unit for debounce times (git-fixes).\n- gpio: mpc8xxx: Add platform device to gpiochip-\u003eparent (git-fixes).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).\n- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).\n- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).\n- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).\n- gpiolib: fix up emulated open drain outputs (git-fixes).\n- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).\n- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).\n- HID: core: Correctly handle ReportSize being zero (git-fixes).\n- HID: cypress: Support Varmilo Keyboards\u0027 media hotkeys (git-fixes).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: Improve Windows Precision Touchpad detection (git-fixes).\n- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).\n- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).\n- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).\n- i2c: i801: Fix resume bug (git-fixes).\n- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).\n- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).\n- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- iio: adc: max1027: Reset the device at probe time (git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: bmp280: fix compensation of humidity (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).\n- iio: fix center temperature of bmc150-accel-core (git-fixes).\n- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).\n- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).\n- iio: srf04: fix wrong limitation in distance measuring (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send \u0027scancodes\u0027 in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n- Input: trackpoint - add new trackpoint variant IDs (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- ipw2x00: Fix -Wcast-function-type (git-fixes).\n- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- kABI workaround for dsa/b53 changes (git-fixes).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI workaround for net/ipvlan changes (git-fixes).\n- kABI: ath10k: move a new structure member to the end (git-fixes).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).\n- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: fix authentication with iwlwifi/mvm (git-fixes).\n- mac80211: fix use of skb payload instead of header (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- matroxfb: avoid -Warray-bounds warning (git-fixes).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- md/raid5: fix oops during stripe resizing (git-fixes).\n- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).\n- media: cec-funcs.h: add status_req checks (git-fixes).\n- media: cx88: Fix some error handling path in \u0027cx8800_initdev()\u0027 (git-fixes).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).\n- media: i2c: ov2659: Fix missing 720p register config (git-fixes).\n- media: i2c: ov2659: fix s_stream return value (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).\n- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: si470x-i2c: add missed operations in remove (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).\n- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).\n- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mei: protect mei_cl_mtu from null dereference (git-fixes).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- Move upstreamed bt fixes into sorted section\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).\n- net: aquantia: fix LRO with FCS error (git-fixes).\n- net: dsa: b53: Always use dev-\u003evlan_enabled in b53_configure_vlan() (git-fixes).\n- net: dsa: b53: Ensure the default VID is untagged (git-fixes).\n- net: dsa: b53: Fix default VLAN ID (git-fixes).\n- net: dsa: b53: Properly account for VLAN filtering (git-fixes).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).\n- net: dsa: qca8k: remove leftover phy accessors (git-fixes).\n- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).\n- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).\n- net: macb: add missing barriers when reading descriptors (git-fixes).\n- net: macb: fix dropped RX frames due to a race (git-fixes).\n- net: macb: fix error format in dev_err() (git-fixes).\n- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).\n- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).\n- net: phy: Avoid multiple suspends (git-fixes).\n- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).\n- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).\n- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).\n- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).\n- net: stmmac: fix csr_clk can\u0027t be zero issue (git-fixes).\n- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).\n- net: usb: sr9800: fix uninitialized local variable (git-fixes).\n- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).\n- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- parport: load lowlevel driver if ports not found (git-fixes).\n- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- phy: Revert toggling reset changes (git-fixes).\n- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).\n- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).\n- PM: ACPI: Output correct message on target power state (git-fixes).\n- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).\n- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- ppp: remove the PPPIOCDETACH ioctl (git-fixes).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).\n- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).\n- regmap: debugfs: check count when read regmap file (git-fixes).\n- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).\n- regulator: pfuze100-regulator: Variable \u0027val\u0027 in pfuze100_regulator_probe() could be uninitialized (git-fixes).\n- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).\n- remoteproc: Fix wrong rvring index computation (git-fixes).\n- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).\n- rtc: 88pm860x: fix possible race condition (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).\n- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).\n- scsi: lpfc: Fix spelling mistake \u0027Cant\u0027 -\u003e \u0027Can\u0027t\u0027 (bsc#1164780).\n- scsi: lpfc: Fix variable \u0027vport\u0027 set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).\n- scsi: lpfc: Remove set but not used \u0027qp\u0027 (bsc#1164780).\n- scsi: lpfc: Remove unneeded variable \u0027status\u0027 in lpfc_fcp_cpu_map_store() (bsc#1164780).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).\n- scsi: lpfc: Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).\n- scsi: lpfc: Use generic power management (bsc#1164780).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: Remove unneeded break statements (bsc#1164780).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).\n- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: imx: gpc: fix power up sequencing (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n- spi: dw: Fix Rx-only DMA transfers (git-fixes).\n- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).\n- spi: Fix memory leak on splited transfers (git-fixes).\n- spi: img-spfi: fix potential double release (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: pxa2xx: Add missed security checks (git-fixes).\n- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).\n- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).\n- spi: spi-mem: Fix passing zero to \u0027PTR_ERR\u0027 warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: add missed clk_unprepare (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: add a missing dependency (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).\n- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).\n- staging: rtl8188eu: fix possible null dereference (git-fixes).\n- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).\n- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- staging: wlan-ng: properly check endpoint types (git-fixes).\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- SUNRPC: The RDMA back channel mustn\u0027t disappear while requests are outstanding (git-fixes).\n- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).\n- timer: Fix wheel index calculation on last level (git fixes)\n- timer: Prevent base-\u003eclk from moving backward (git-fixes)\n- tty: always relink the port (git-fixes).\n- tty: link tty and port before configuring it as console (git-fixes).\n- tty: synclink_gt: Adjust indentation in several functions (git-fixes).\n- tty: synclinkmp: Adjust indentation in several functions (git-fixes).\n- tty:serial:mvebu-uart:fix a wrong return (git-fixes).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).\n- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- usb: dwc2: Fix IN FIFO allocation (git-fixes).\n- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).\n- usb: fsl: Check memory resource before releasing it (git-fixes).\n- usb: gadget: composite: Fix possible double free memory bug (git-fixes).\n- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).\n- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).\n- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).\n- usb: gadget: fix wrong endpoint desc (git-fixes).\n- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).\n- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).\n- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).\n- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).\n- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n- usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n- usb: ldusb: use unsigned size format specifiers (git-fixes).\n- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).\n- usb: serial: digi_acceleport: clean up set_termios (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: digi_acceleport: remove in_interrupt() usage.\n- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).\n- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).\n- usb: serial: digi_acceleport: use irqsave() in USB\u0027s complete callback (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usb: Skip endpoints with 0 maxpacket length (git-fixes).\n- usb: UAS: introduce a quirk to set no_write_same (git-fixes).\n- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).\n- usblp: poison URBs upon disconnect (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).\n- vt: do not hardcode the mem allocation upper bound (git-fixes).\n- vt: Reject zero-sized screen buffer size (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: da9062: do not ping the hw during stop() (git-fixes).\n- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n- wireless: Use offsetof instead of custom macro (git-fixes).\n- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-95,SUSE-SLE-Module-RT-15-SP1-2021-95",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0095-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:0095-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210095-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:0095-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1040855",
        "url": "https://bugzilla.suse.com/1040855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1044120",
        "url": "https://bugzilla.suse.com/1044120"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1044767",
        "url": "https://bugzilla.suse.com/1044767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1055117",
        "url": "https://bugzilla.suse.com/1055117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109695",
        "url": "https://bugzilla.suse.com/1109695"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1115431",
        "url": "https://bugzilla.suse.com/1115431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1138374",
        "url": "https://bugzilla.suse.com/1138374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144912",
        "url": "https://bugzilla.suse.com/1144912"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152457",
        "url": "https://bugzilla.suse.com/1152457"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163727",
        "url": "https://bugzilla.suse.com/1163727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164780",
        "url": "https://bugzilla.suse.com/1164780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171078",
        "url": "https://bugzilla.suse.com/1171078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172145",
        "url": "https://bugzilla.suse.com/1172145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172538",
        "url": "https://bugzilla.suse.com/1172538"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174784",
        "url": "https://bugzilla.suse.com/1174784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178401",
        "url": "https://bugzilla.suse.com/1178401"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178762",
        "url": "https://bugzilla.suse.com/1178762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179014",
        "url": "https://bugzilla.suse.com/1179014"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179015",
        "url": "https://bugzilla.suse.com/1179015"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179045",
        "url": "https://bugzilla.suse.com/1179045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179082",
        "url": "https://bugzilla.suse.com/1179082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179107",
        "url": "https://bugzilla.suse.com/1179107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179142",
        "url": "https://bugzilla.suse.com/1179142"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179419",
        "url": "https://bugzilla.suse.com/1179419"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179444",
        "url": "https://bugzilla.suse.com/1179444"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179745",
        "url": "https://bugzilla.suse.com/1179745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179810",
        "url": "https://bugzilla.suse.com/1179810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179888",
        "url": "https://bugzilla.suse.com/1179888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179895",
        "url": "https://bugzilla.suse.com/1179895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179896",
        "url": "https://bugzilla.suse.com/1179896"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179960",
        "url": "https://bugzilla.suse.com/1179960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179963",
        "url": "https://bugzilla.suse.com/1179963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180027",
        "url": "https://bugzilla.suse.com/1180027"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180029",
        "url": "https://bugzilla.suse.com/1180029"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180031",
        "url": "https://bugzilla.suse.com/1180031"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180052",
        "url": "https://bugzilla.suse.com/1180052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180086",
        "url": "https://bugzilla.suse.com/1180086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180117",
        "url": "https://bugzilla.suse.com/1180117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180258",
        "url": "https://bugzilla.suse.com/1180258"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180506",
        "url": "https://bugzilla.suse.com/1180506"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180559",
        "url": "https://bugzilla.suse.com/1180559"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0444 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0444/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0465 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0465/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0466 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0466/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27068 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27777 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27777/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27825 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27825/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29660 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29661 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29661/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36158 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36158/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-01-12T18:14:55Z",
      "generator": {
        "date": "2021-01-12T18:14:55Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:0095-1",
      "initial_release_date": "2021-01-12T18:14:55Z",
      "revision_history": [
        {
          "date": "2021-01-12T18:14:55Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-4.12.14-14.47.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-4.12.14-14.47.1.noarch",
                  "product_id": "kernel-devel-rt-4.12.14-14.47.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-4.12.14-14.47.1.noarch",
                "product": {
                  "name": "kernel-source-rt-4.12.14-14.47.1.noarch",
                  "product_id": "kernel-source-rt-4.12.14-14.47.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                  "product_id": "cluster-md-kmp-rt_debug-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-4.12.14-14.47.1.x86_64",
                  "product_id": "dlm-kmp-rt-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                  "product_id": "dlm-kmp-rt_debug-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
                  "product_id": "gfs2-kmp-rt-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                  "product_id": "gfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-base-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt-base-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt-base-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt-devel-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt-extra-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt_debug-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-base-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-base-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt_debug-base-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-extra-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-extra-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt_debug-extra-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-4.12.14-14.47.1.x86_64",
                  "product_id": "kernel-syms-rt-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-4.12.14-14.47.1.x86_64",
                  "product_id": "kselftests-kmp-rt-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                  "product_id": "kselftests-kmp-rt_debug-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                  "product_id": "ocfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-4.12.14-14.47.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-4.12.14-14.47.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt_debug-4.12.14-14.47.1.x86_64",
                  "product_id": "reiserfs-kmp-rt_debug-4.12.14-14.47.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Real Time Module 15 SP1",
                "product": {
                  "name": "SUSE Real Time Module 15 SP1",
                  "product_id": "SUSE Real Time Module 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-rt:15:sp1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-4.12.14-14.47.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-4.12.14-14.47.1.noarch as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch"
        },
        "product_reference": "kernel-devel-rt-4.12.14-14.47.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64"
        },
        "product_reference": "kernel-rt-4.12.14-14.47.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-base-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64"
        },
        "product_reference": "kernel-rt-base-4.12.14-14.47.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-4.12.14-14.47.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-4.12.14-14.47.1.noarch as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch"
        },
        "product_reference": "kernel-source-rt-4.12.14-14.47.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-4.12.14-14.47.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-0444",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0444"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0444",
          "url": "https://www.suse.com/security/cve/CVE-2020-0444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180027 for CVE-2020-0444",
          "url": "https://bugzilla.suse.com/1180027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180028 for CVE-2020-0444",
          "url": "https://bugzilla.suse.com/1180028"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-12T18:14:55Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0444"
    },
    {
      "cve": "CVE-2020-0465",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0465"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0465",
          "url": "https://www.suse.com/security/cve/CVE-2020-0465"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180029 for CVE-2020-0465",
          "url": "https://bugzilla.suse.com/1180029"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180030 for CVE-2020-0465",
          "url": "https://bugzilla.suse.com/1180030"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-12T18:14:55Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-0465"
    },
    {
      "cve": "CVE-2020-0466",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0466"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0466",
          "url": "https://www.suse.com/security/cve/CVE-2020-0466"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180031 for CVE-2020-0466",
          "url": "https://bugzilla.suse.com/1180031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180032 for CVE-2020-0466",
          "url": "https://bugzilla.suse.com/1180032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199255 for CVE-2020-0466",
          "url": "https://bugzilla.suse.com/1199255"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200084 for CVE-2020-0466",
          "url": "https://bugzilla.suse.com/1200084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-12T18:14:55Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-0466"
    },
    {
      "cve": "CVE-2020-27068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27068",
          "url": "https://www.suse.com/security/cve/CVE-2020-27068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180086 for CVE-2020-27068",
          "url": "https://bugzilla.suse.com/1180086"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-12T18:14:55Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27068"
    },
    {
      "cve": "CVE-2020-27777",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27777"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27777",
          "url": "https://www.suse.com/security/cve/CVE-2020-27777"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179107 for CVE-2020-27777",
          "url": "https://bugzilla.suse.com/1179107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179419 for CVE-2020-27777",
          "url": "https://bugzilla.suse.com/1179419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200343 for CVE-2020-27777",
          "url": "https://bugzilla.suse.com/1200343"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220060 for CVE-2020-27777",
          "url": "https://bugzilla.suse.com/1220060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-12T18:14:55Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27777"
    },
    {
      "cve": "CVE-2020-27825",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27825"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27825",
          "url": "https://www.suse.com/security/cve/CVE-2020-27825"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179960 for CVE-2020-27825",
          "url": "https://bugzilla.suse.com/1179960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179961 for CVE-2020-27825",
          "url": "https://bugzilla.suse.com/1179961"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-12T18:14:55Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-27825"
    },
    {
      "cve": "CVE-2020-29660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29660",
          "url": "https://www.suse.com/security/cve/CVE-2020-29660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179745 for CVE-2020-29660",
          "url": "https://bugzilla.suse.com/1179745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179877 for CVE-2020-29660",
          "url": "https://bugzilla.suse.com/1179877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-12T18:14:55Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-29660"
    },
    {
      "cve": "CVE-2020-29661",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29661"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29661",
          "url": "https://www.suse.com/security/cve/CVE-2020-29661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179745 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1179745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179877 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1179877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214268 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1214268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218966 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1218966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-12T18:14:55Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-29661"
    },
    {
      "cve": "CVE-2020-36158",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36158"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36158",
          "url": "https://www.suse.com/security/cve/CVE-2020-36158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180559 for CVE-2020-36158",
          "url": "https://bugzilla.suse.com/1180559"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180562 for CVE-2020-36158",
          "url": "https://bugzilla.suse.com/1180562"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-12T18:14:55Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-36158"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…