Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2019-13272
Vulnerability from cvelistv5
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2021-12-10
Due date: 2022-06-10
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-13272
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:49:24.327Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { name: "FEDORA-2019-a95015e60f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/", }, { name: "DSA-4484", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4484", }, { name: "20190722 [SECURITY] [DSA 4484-1] linux security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Jul/30", }, { name: "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Jul/33", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20190806-0001/", }, { name: "RHSA-2019:2405", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { name: "RHSA-2019:2411", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { name: "USN-4093-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4093-1/", }, { name: "USN-4094-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4094-1/", }, { name: "USN-4095-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4095-1/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K91025336", }, { name: "USN-4117-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4117-1/", }, { name: "USN-4118-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4118-1/", }, { name: "RHSA-2019:2809", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2019-13272", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-04T20:35:06.511512Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2021-12-10", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-13272", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T20:35:33.942Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-23T18:06:10.000Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", }, { tags: [ "x_refsource_MISC", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { tags: [ "x_refsource_MISC", ], url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { name: "FEDORA-2019-a95015e60f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/", }, { name: "DSA-4484", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4484", }, { name: "20190722 [SECURITY] [DSA 4484-1] linux security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Jul/30", }, { name: "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Jul/33", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20190806-0001/", }, { name: "RHSA-2019:2405", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { name: "RHSA-2019:2411", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { name: "USN-4093-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4093-1/", }, { name: "USN-4094-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4094-1/", }, { name: "USN-4095-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4095-1/", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K91025336", }, { name: "USN-4117-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4117-1/", }, { name: "USN-4118-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4118-1/", }, { name: "RHSA-2019:2809", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-13272", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", }, { name: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", refsource: "MISC", url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", }, { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", refsource: "MISC", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", }, { name: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { name: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", refsource: "MISC", url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { name: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", refsource: "CONFIRM", url: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { name: "FEDORA-2019-a95015e60f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/", }, { name: "DSA-4484", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4484", }, { name: "20190722 [SECURITY] [DSA 4484-1] linux security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Jul/30", }, { name: "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Jul/33", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html", }, { name: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { name: "https://security.netapp.com/advisory/ntap-20190806-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190806-0001/", }, { name: "RHSA-2019:2405", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { name: "RHSA-2019:2411", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { name: "USN-4093-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4093-1/", }, { name: "USN-4094-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4094-1/", }, { name: "USN-4095-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4095-1/", }, { name: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", }, { name: "https://support.f5.com/csp/article/K91025336", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K91025336", }, { name: "USN-4117-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4117-1/", }, { name: "USN-4118-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4118-1/", }, { name: "RHSA-2019:2809", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { name: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS", }, { name: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", }, { name: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", }, { name: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-13272", datePublished: "2019-07-17T12:32:55.000Z", dateReserved: "2019-07-04T00:00:00.000Z", dateUpdated: "2025-02-04T20:35:33.942Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { cisa_known_exploited: { cveID: "CVE-2019-13272", cwes: "[\"CWE-269\"]", dateAdded: "2021-12-10", dueDate: "2022-06-10", knownRansomwareCampaignUse: "Unknown", notes: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", product: "Kernel", requiredAction: "Apply updates per vendor instructions.", shortDescription: "Kernel/ptrace.c in Linux kernel mishandles contains an improper privilege management vulnerability that allows local users to obtain root access.", vendorProject: "Linux", vulnerabilityName: "Linux Kernel Improper Privilege Management Vulnerability", }, nvd: "{\"cve\":{\"id\":\"CVE-2019-13272\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-07-17T13:15:10.687\",\"lastModified\":\"2025-04-03T20:28:35.577\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux anterior a versión 5.1.17, ptrace_link en el archivo kernel/ptrace.c maneja inapropiadamente la grabación de las credenciales de un proceso que desea crear una relación de ptrace, que permite a los usuarios locales obtener acceso de root aprovechando determinados escenarios con un relación de proceso padre-hijo, donde un padre elimina los privilegios y llama a execve (permitiendo potencialmente el control por parte de un atacante). Un factor que contribuye es un problema de vida útil del objeto (que también puede causar un pánico). Otro factor que contribuye es el marcado incorrecto de una relación de ptrace como privilegiada, que puede ser explotada mediante (por ejemplo) el ayudante pkexec de Polkit con PTRACE_TRACEME. NOTA: deny_ptrace de SELinux puede ser una solución útil en algunos entornos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2021-12-10\",\"cisaActionDue\":\"2022-06-10\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Linux Kernel Improper Privilege Management Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.16.52\",\"versionEndExcluding\":\"3.16.71\",\"matchCriteriaId\":\"AA88B130-CD8A-4E14-A1F5-4D1DB031D60E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1.39\",\"versionEndExcluding\":\"4.2\",\"matchCriteriaId\":\"CD709672-0E6A-4086-8700-B6C2FDD8599C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.40\",\"versionEndExcluding\":\"4.4.185\",\"matchCriteriaId\":\"19FB5FC5-740B-418F-B83A-3EA6095270C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.8.16\",\"versionEndExcluding\":\"4.9\",\"matchCriteriaId\":\"66431BA1-01B5-476A-B483-AE4E7B830BA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9.1\",\"versionEndExcluding\":\"4.9.185\",\"matchCriteriaId\":\"8A719867-AEB7-4E95-A1DE-B96EA092D9FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.133\",\"matchCriteriaId\":\"00D95A2F-5B17-46D9-80D7-2E0D1779C2CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.58\",\"matchCriteriaId\":\"F921620B-E2A7-421F-8C89-016C51723C17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.1.17\",\"matchCriteriaId\":\"7049E422-0D4B-45FD-8B06-04BACD44A66E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"B3293E55-5506-4587-A318-D1734F781C09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:7.0_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA559D29-DF65-48AF-96DB-D20A50474758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2148300C-ECBD-4ED5-A164-79629859DD43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF9BCF3-187F-410A-96CA-9C47D3ED6924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"782C86CD-1B68-410A-A096-E5170AD24DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C61DDC-81F3-4E2D-9CAA-17A256C85443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B0DA79-DF12-4418-B075-F048C9E2979A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5DE3C5-B090-4CE7-9AF2-DEB379D7D5FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF7275A1-8853-469E-939B-7533E9E8C499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92409A9-0D6B-4B7E-8847-1B63837D201F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5C5860E-9FEB-4259-92FD-A85911E2F99E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE99A08-D6F7-4937-8154-65062BC88009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"665DF1D3-EB88-4A17-B888-3B3CE298269B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952F55C9-7E7C-4539-9D08-E736B3488569\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FED1B0D-F901-413A-85D9-05D4C427570D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7CFE0E-9D1E-4495-B302-89C3096FC0DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B8DB06-590A-4008-B0AB-FCD1401C77C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.60.3\",\"matchCriteriaId\":\"BD1E9594-C46F-40D1-8BC2-6B16635B55C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146A767F-DC04-454B-9913-17D3A2B5AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2405\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2411\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2809\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1903\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1730895\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1140671\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/30\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/33\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190806-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91025336\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4093-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4094-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4095-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4117-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4484\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2405\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2411\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2809\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1730895\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1140671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190806-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91025336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4093-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4094-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4095-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4117-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4484\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://bugs.chromium.org/p/project-zero/issues/detail?id=1903\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1140671\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1730895\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/\", \"name\": \"FEDORA-2019-a95015e60f\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2019/dsa-4484\", \"name\": \"DSA-4484\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jul/30\", \"name\": \"20190722 [SECURITY] [DSA 4484-1] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jul/33\", \"name\": \"20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html\", \"name\": \"[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html\", \"name\": \"[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190806-0001/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2405\", \"name\": \"RHSA-2019:2405\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2411\", \"name\": \"RHSA-2019:2411\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/4093-1/\", \"name\": \"USN-4093-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/4094-1/\", \"name\": \"USN-4094-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/4095-1/\", \"name\": \"USN-4095-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://support.f5.com/csp/article/K91025336\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/4117-1/\", \"name\": \"USN-4117-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/4118-1/\", \"name\": \"USN-4118-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2809\", \"name\": \"RHSA-2019:2809\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T23:49:24.327Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-13272\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-04T20:35:06.511512Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2021-12-10\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-13272\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-04T20:35:01.043Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://bugs.chromium.org/p/project-zero/issues/detail?id=1903\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1140671\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1730895\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/\", \"name\": \"FEDORA-2019-a95015e60f\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"https://www.debian.org/security/2019/dsa-4484\", \"name\": \"DSA-4484\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jul/30\", \"name\": \"20190722 [SECURITY] [DSA 4484-1] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jul/33\", \"name\": \"20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html\", \"name\": \"[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html\", \"name\": \"[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190806-0001/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2405\", \"name\": \"RHSA-2019:2405\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2411\", \"name\": \"RHSA-2019:2411\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://usn.ubuntu.com/4093-1/\", \"name\": \"USN-4093-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://usn.ubuntu.com/4094-1/\", \"name\": \"USN-4094-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://usn.ubuntu.com/4095-1/\", \"name\": \"USN-4095-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://support.f5.com/csp/article/K91025336\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://usn.ubuntu.com/4117-1/\", \"name\": \"USN-4117-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://usn.ubuntu.com/4118-1/\", \"name\": \"USN-4118-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2809\", \"name\": \"RHSA-2019:2809\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2021-11-23T18:06:10.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html\", \"name\": \"http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://bugs.chromium.org/p/project-zero/issues/detail?id=1903\", \"name\": \"https://bugs.chromium.org/p/project-zero/issues/detail?id=1903\", \"refsource\": \"MISC\"}, {\"url\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17\", \"name\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17\", \"refsource\": \"MISC\"}, {\"url\": \"https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee\", \"name\": \"https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee\", \"refsource\": \"MISC\"}, {\"url\": \"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee\", \"name\": \"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee\", \"refsource\": \"MISC\"}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1140671\", \"name\": \"https://bugzilla.suse.com/show_bug.cgi?id=1140671\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1730895\", \"name\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1730895\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/\", \"name\": \"FEDORA-2019-a95015e60f\", \"refsource\": \"FEDORA\"}, {\"url\": \"https://www.debian.org/security/2019/dsa-4484\", \"name\": \"DSA-4484\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Jul/30\", \"name\": \"20190722 [SECURITY] [DSA 4484-1] linux security update\", \"refsource\": \"BUGTRAQ\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Jul/33\", \"name\": \"20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)\", \"refsource\": \"BUGTRAQ\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html\", \"name\": \"[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html\", \"name\": \"[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update\", \"refsource\": \"MLIST\"}, {\"url\": \"http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\", \"name\": \"http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190806-0001/\", \"name\": \"https://security.netapp.com/advisory/ntap-20190806-0001/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2405\", \"name\": \"RHSA-2019:2405\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2411\", \"name\": \"RHSA-2019:2411\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://usn.ubuntu.com/4093-1/\", \"name\": \"USN-4093-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://usn.ubuntu.com/4094-1/\", \"name\": \"USN-4094-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://usn.ubuntu.com/4095-1/\", \"name\": \"USN-4095-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html\", \"name\": \"http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://support.f5.com/csp/article/K91025336\", \"name\": \"https://support.f5.com/csp/article/K91025336\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://usn.ubuntu.com/4117-1/\", \"name\": \"USN-4117-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://usn.ubuntu.com/4118-1/\", \"name\": \"USN-4118-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2809\", \"name\": \"RHSA-2019:2809\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS\", \"name\": \"https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html\", \"name\": \"http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html\", \"name\": \"http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html\", \"name\": \"http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-13272\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"cve@mitre.org\"}}}}", cveMetadata: "{\"cveId\": \"CVE-2019-13272\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-04T20:35:33.942Z\", \"dateReserved\": \"2019-07-04T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2019-07-17T12:32:55.000Z\", \"assignerShortName\": \"mitre\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
suse-su-2019:3228-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.4.180-94_100 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n\nThe following bugs were fixed:\n\n- Fixed boot up hang revealed by int3 self test (bsc#1157770).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3228,SUSE-SLE-SAP-12-SP3-2019-3228,SUSE-SLE-SAP-12-SP3-2019-3229,SUSE-SLE-SERVER-12-SP3-2019-3228,SUSE-SLE-SERVER-12-SP3-2019-3229", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3228-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3228-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193228-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3228-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156317", url: "https://bugzilla.suse.com/1156317", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156331", url: "https://bugzilla.suse.com/1156331", }, { category: "self", summary: "SUSE Bug 1157770", url: "https://bugzilla.suse.com/1157770", }, { category: "self", summary: "SUSE CVE CVE-2018-20856 page", url: "https://www.suse.com/security/cve/CVE-2018-20856/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-15239 page", url: "https://www.suse.com/security/cve/CVE-2019-15239/", }, ], title: "Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3)", tracking: { current_release_date: "2019-12-10T09:15:51Z", generator: { date: "2019-12-10T09:15:51Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3228-1", initial_release_date: "2019-12-10T09:15:51Z", revision_history: [ { date: "2019-12-10T09:15:51Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", product: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", product_id: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", product: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", product_id: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", product: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", product_id: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", product: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", product_id: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-20856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20856", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20856", url: "https://www.suse.com/security/cve/CVE-2018-20856", }, { category: "external", summary: "SUSE Bug 1143048 for CVE-2018-20856", url: "https://bugzilla.suse.com/1143048", }, { category: "external", summary: "SUSE Bug 1156331 for CVE-2018-20856", url: "https://bugzilla.suse.com/1156331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:15:51Z", details: "moderate", }, ], title: "CVE-2018-20856", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:15:51Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:15:51Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-15239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15239", }, ], notes: [ { category: "general", text: "In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15239", url: "https://www.suse.com/security/cve/CVE-2019-15239", }, { category: "external", summary: "SUSE Bug 1146589 for CVE-2019-15239", url: "https://bugzilla.suse.com/1146589", }, { category: "external", summary: "SUSE Bug 1156317 for CVE-2019-15239", url: "https://bugzilla.suse.com/1156317", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_100-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_97-default-6-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:15:51Z", details: "important", }, ], title: "CVE-2019-15239", }, ], }
suse-su-2019:2984-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described 'Microarchitectural Data Sampling' attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not\n enforce CAP_NET_RAW, which meant that unprivileged users could create a raw\n socket (bnc#1152782).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,\n which caused an i_size_read() infinite loop and denial of service on SMP\n systems (bnc#1151347).\n\n- CVE-2019-15902: A backporting issue was discovered that re-introduced the\n Spectre vulnerability it had aimed to eliminate. This occurred because the\n backport process depends on cherry picking specific commits, and because two\n (correctly ordered) code lines were swapped (bnc#1149376).\n\n- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused\n by a malicious USB device (bnc#1146519).\n\n- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused\n to cause denial of service (bnc#1148938).\n\n- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a\n process that wants to create a ptrace relationship, which allowed local users\n to obtain root access by leveraging certain scenarios with a parent-child\n process relationship, where a parent drops privileges and calls execve\n (potentially allowing control by an attacker). (bnc#1140671).\n\n- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's kvm\n hypervisor. An unprivileged host user or process with access to '/dev/kvm'\n device could use this flaw to crash the host kernel, resulting in a denial of\n service or potentially escalating privileges on the system (bnc#1151350).\n\n- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by\n crafted USB device traffic (bnc#1147122).\n\n- CVE-2017-18595: A double free in allocate_trace_buffer was fixed\n (bnc#1149555).\n\n- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost\n functionality that translates virtqueue buffers to IOVs. A privileged guest\n user able to pass descriptors with invalid length to the host could use this\n flaw to increase their privileges on the host (bnc#1150112).\n\n- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious\n USB device (bnc#1146361).\n\n- CVE-2019-15924: A a NULL pointer dereference has been fixed in the\n drivers/net/ethernet/intel/fm10k module (bnc#1149612).\n\n- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been\n fixed. This issue could lead to local escalation of privilege with System\n execution privileges needed. (bnc#1150025).\n\n- CVE-2019-15926: An out-of-bounds access was fixed in the\n drivers/net/wireless/ath/ath6kl module. (bnc#1149527).\n\n- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer\n module (bnc#1149522).\n\n- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm\n module that could cause denial of service (bnc#1148394).\n\n- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by\n a malicious USB device (bnc#1146519 1146524).\n\n- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a\n malicious USB device (bnc#1146519 1146526).\n\n- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by\n a malicious USB device (bnc#1146519 1146529).\n\n- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi\n chip driver. That issue allowed local users to cause a denial of service\n (system crash) or possibly execute arbitrary code (bnc#1146512).\n\n- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed\n (bsc#1146512, bsc#1146514, bsc#1146516).\n\n- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver\n was fixed. Local users would have abused this issue to cause a denial of\n service (system crash) or possibly execute arbitrary code (bnc#1146516).\n\n- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket\n option, an attacker could control a pointer in kernel land and cause an\n inet_csk_listen_stop general protection fault, or potentially execute\n arbitrary code under certain circumstances. The issue can be triggered as\n root (e.g., inside a default LXC container or with the CAP_NET_ADMIN\n capability) or after namespace unsharing. (bnc#1145477)\n\n- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently\n low encryption key length and did not prevent an attacker from influencing\n the key length negotiation. This allowed practical brute-force attacks (aka\n 'KNOB') that could decrypt traffic and inject arbitrary ciphertext without\n the victim noticing (bnc#1137865).\n\n- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was\n fixed (bnc#1146378).\n\n- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe\n was fixed (bsc#1146378).\n\n- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver\n (bnc#1146391).\n\n- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc\n (bnc#1146584).\n\n- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/v4l2-core driver (bnc#1146519).\n\n- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB\n device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).\n\n- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed\n (bnc#1146519).\n\n- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device\n was fixed in the drivers/media/usb/siano driver (bnc#1146413).\n\n- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).\n\n- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver\n (bnc#1146285).\n\n- CVE-2019-0154: An unprotected read access to i915 registers has been fixed\n that could have been abused to facilitate a local denial-of-service attack.\n (bsc#1135966)\n\n- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the\n i915 module that allowed batch buffers from user mode to gain super user\n privileges. (bsc#1135967)\n\n- CVE-2019-16231: The fjes driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bnc#1150466)\n\n- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have lead to a denial of service or possibly unspecified other impact (bsc#1156187)\n\n- CVE-2019-18680: A NULL pointer dereference in rds_tcp_kill_sock() could cause denial of service (bnc#1155898)\n\nThe following non-security bugs were fixed:\n\n- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).\n- documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/core: array_index_nospec: Sanitize speculative array (bsc#1155671)\n- ipv6: Update ipv6 defrag code (add bsc#1141054).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm kABI Fix for NX patches (bsc#1117665).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: MMU: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).\n- kvm: MMU: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).\n- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).\n- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).\n- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).\n- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- kvm: x86: simplify ept_misconfig (bsc#1117665).\n- media: smsusb: better handle optional alignment (bsc#1146413).\n- mm: use upstream patch for bsc#1106913\n- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878)\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1068032, bsc#1092497).\n- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bsc#1150223).\n- x86/mitigations: Backport the STIBP pile See bsc#1139550\n- xen-blkfront: avoid ENOMEM in blkif_recover after migration (bsc#1149849).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-2984,SUSE-OpenStack-Cloud-7-2019-2984,SUSE-SLE-HA-12-SP2-2019-2984,SUSE-SLE-SAP-12-SP2-2019-2984,SUSE-SLE-SERVER-12-SP2-2019-2984,SUSE-SLE-SERVER-12-SP2-BCL-2019-2984", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2984-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:2984-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:2984-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html", }, { category: "self", summary: "SUSE Bug 1068032", url: "https://bugzilla.suse.com/1068032", }, { category: "self", summary: "SUSE Bug 1084878", url: "https://bugzilla.suse.com/1084878", }, { category: "self", summary: "SUSE Bug 1092497", url: "https://bugzilla.suse.com/1092497", }, { category: "self", summary: "SUSE Bug 1106913", url: "https://bugzilla.suse.com/1106913", }, { category: "self", summary: "SUSE Bug 1117665", url: "https://bugzilla.suse.com/1117665", }, { category: "self", summary: "SUSE Bug 1135966", url: "https://bugzilla.suse.com/1135966", }, { category: "self", summary: "SUSE Bug 1135967", url: "https://bugzilla.suse.com/1135967", }, { category: "self", summary: "SUSE Bug 1137865", url: "https://bugzilla.suse.com/1137865", }, { category: "self", summary: "SUSE Bug 1139550", url: "https://bugzilla.suse.com/1139550", }, { category: "self", summary: "SUSE Bug 1140671", url: "https://bugzilla.suse.com/1140671", }, { category: "self", summary: "SUSE Bug 1141054", url: "https://bugzilla.suse.com/1141054", }, { category: "self", summary: "SUSE Bug 1144338", url: "https://bugzilla.suse.com/1144338", }, { category: "self", summary: "SUSE Bug 1144903", url: "https://bugzilla.suse.com/1144903", }, { category: "self", summary: "SUSE Bug 1145477", url: "https://bugzilla.suse.com/1145477", }, { category: "self", summary: "SUSE Bug 1146285", url: "https://bugzilla.suse.com/1146285", }, { category: "self", summary: "SUSE Bug 1146361", url: "https://bugzilla.suse.com/1146361", }, { category: "self", summary: "SUSE Bug 1146378", url: "https://bugzilla.suse.com/1146378", }, { category: "self", summary: "SUSE Bug 1146391", url: "https://bugzilla.suse.com/1146391", }, { category: "self", summary: "SUSE Bug 1146413", url: "https://bugzilla.suse.com/1146413", }, { category: "self", summary: "SUSE Bug 1146425", url: "https://bugzilla.suse.com/1146425", }, { category: "self", summary: "SUSE Bug 1146512", url: "https://bugzilla.suse.com/1146512", }, { category: "self", summary: "SUSE Bug 1146514", url: "https://bugzilla.suse.com/1146514", }, { category: "self", summary: "SUSE Bug 1146516", url: "https://bugzilla.suse.com/1146516", }, { category: "self", summary: "SUSE Bug 1146519", url: "https://bugzilla.suse.com/1146519", }, { category: "self", summary: "SUSE Bug 1146584", url: "https://bugzilla.suse.com/1146584", }, { category: "self", summary: "SUSE Bug 1147122", url: "https://bugzilla.suse.com/1147122", }, { category: "self", summary: "SUSE Bug 1148394", url: "https://bugzilla.suse.com/1148394", }, { category: "self", summary: "SUSE Bug 1148938", url: "https://bugzilla.suse.com/1148938", }, { category: "self", summary: "SUSE Bug 1149376", url: "https://bugzilla.suse.com/1149376", }, { category: "self", summary: "SUSE Bug 1149522", url: "https://bugzilla.suse.com/1149522", }, { category: "self", summary: "SUSE Bug 1149527", url: "https://bugzilla.suse.com/1149527", }, { category: "self", summary: "SUSE Bug 1149555", url: "https://bugzilla.suse.com/1149555", }, { category: "self", summary: "SUSE Bug 1149612", url: "https://bugzilla.suse.com/1149612", }, { category: "self", summary: "SUSE Bug 1149849", url: "https://bugzilla.suse.com/1149849", }, { category: "self", summary: "SUSE Bug 1150025", url: "https://bugzilla.suse.com/1150025", }, { category: "self", summary: "SUSE Bug 1150112", url: "https://bugzilla.suse.com/1150112", }, { category: "self", summary: "SUSE Bug 1150223", url: "https://bugzilla.suse.com/1150223", }, { category: "self", summary: "SUSE Bug 1150452", url: "https://bugzilla.suse.com/1150452", }, { category: "self", summary: "SUSE Bug 1150457", url: "https://bugzilla.suse.com/1150457", }, { category: "self", summary: "SUSE Bug 1150465", url: "https://bugzilla.suse.com/1150465", }, { category: "self", summary: "SUSE Bug 1150466", url: "https://bugzilla.suse.com/1150466", }, { category: "self", summary: "SUSE Bug 1151347", url: "https://bugzilla.suse.com/1151347", }, { category: "self", summary: "SUSE Bug 1151350", url: "https://bugzilla.suse.com/1151350", }, { category: "self", summary: "SUSE Bug 1152685", url: "https://bugzilla.suse.com/1152685", }, { category: "self", summary: "SUSE Bug 1152782", url: "https://bugzilla.suse.com/1152782", }, { category: "self", summary: "SUSE Bug 1152788", url: "https://bugzilla.suse.com/1152788", }, { category: "self", summary: "SUSE Bug 1153158", url: "https://bugzilla.suse.com/1153158", }, { category: "self", summary: "SUSE Bug 1154372", url: "https://bugzilla.suse.com/1154372", }, { category: "self", summary: "SUSE Bug 1155671", url: "https://bugzilla.suse.com/1155671", }, { category: "self", summary: "SUSE Bug 1155898", url: "https://bugzilla.suse.com/1155898", }, { category: "self", summary: "SUSE Bug 1156187", url: "https://bugzilla.suse.com/1156187", }, { category: "self", summary: "SUSE CVE CVE-2016-10906 page", url: "https://www.suse.com/security/cve/CVE-2016-10906/", }, { category: "self", summary: "SUSE CVE CVE-2017-18509 page", url: "https://www.suse.com/security/cve/CVE-2017-18509/", }, { category: "self", summary: "SUSE CVE CVE-2017-18595 page", url: "https://www.suse.com/security/cve/CVE-2017-18595/", }, { category: "self", summary: "SUSE CVE CVE-2018-12207 page", url: "https://www.suse.com/security/cve/CVE-2018-12207/", }, { category: "self", summary: "SUSE CVE CVE-2018-20976 page", url: "https://www.suse.com/security/cve/CVE-2018-20976/", }, { category: "self", summary: "SUSE CVE CVE-2019-0154 page", url: "https://www.suse.com/security/cve/CVE-2019-0154/", }, { category: "self", summary: "SUSE CVE CVE-2019-0155 page", url: "https://www.suse.com/security/cve/CVE-2019-0155/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-11135 page", url: "https://www.suse.com/security/cve/CVE-2019-11135/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-14814 page", url: "https://www.suse.com/security/cve/CVE-2019-14814/", }, { category: "self", summary: "SUSE CVE CVE-2019-14815 page", url: "https://www.suse.com/security/cve/CVE-2019-14815/", }, { category: "self", summary: "SUSE CVE CVE-2019-14816 page", url: "https://www.suse.com/security/cve/CVE-2019-14816/", }, { category: "self", summary: "SUSE CVE CVE-2019-14821 page", url: "https://www.suse.com/security/cve/CVE-2019-14821/", }, { category: "self", summary: "SUSE CVE CVE-2019-14835 page", url: "https://www.suse.com/security/cve/CVE-2019-14835/", }, { category: "self", summary: "SUSE CVE CVE-2019-15098 page", url: "https://www.suse.com/security/cve/CVE-2019-15098/", }, { category: "self", summary: "SUSE CVE CVE-2019-15211 page", url: "https://www.suse.com/security/cve/CVE-2019-15211/", }, { category: "self", summary: "SUSE CVE CVE-2019-15212 page", url: "https://www.suse.com/security/cve/CVE-2019-15212/", }, { category: "self", summary: "SUSE CVE CVE-2019-15214 page", url: "https://www.suse.com/security/cve/CVE-2019-15214/", }, { category: "self", summary: "SUSE CVE CVE-2019-15215 page", url: "https://www.suse.com/security/cve/CVE-2019-15215/", }, { category: "self", summary: "SUSE CVE CVE-2019-15216 page", url: "https://www.suse.com/security/cve/CVE-2019-15216/", }, { category: "self", summary: "SUSE CVE CVE-2019-15217 page", url: "https://www.suse.com/security/cve/CVE-2019-15217/", }, { category: "self", summary: "SUSE CVE CVE-2019-15218 page", url: "https://www.suse.com/security/cve/CVE-2019-15218/", }, { category: "self", summary: "SUSE CVE CVE-2019-15219 page", url: "https://www.suse.com/security/cve/CVE-2019-15219/", }, { category: "self", summary: "SUSE CVE CVE-2019-15220 page", url: "https://www.suse.com/security/cve/CVE-2019-15220/", }, { category: "self", summary: "SUSE CVE CVE-2019-15221 page", url: "https://www.suse.com/security/cve/CVE-2019-15221/", }, { category: "self", summary: "SUSE CVE CVE-2019-15290 page", url: "https://www.suse.com/security/cve/CVE-2019-15290/", }, { category: "self", summary: "SUSE CVE CVE-2019-15291 page", url: "https://www.suse.com/security/cve/CVE-2019-15291/", }, { category: "self", summary: "SUSE CVE CVE-2019-15505 page", url: "https://www.suse.com/security/cve/CVE-2019-15505/", }, { category: "self", summary: "SUSE CVE CVE-2019-15666 page", url: "https://www.suse.com/security/cve/CVE-2019-15666/", }, { category: "self", summary: "SUSE CVE CVE-2019-15807 page", url: "https://www.suse.com/security/cve/CVE-2019-15807/", }, { category: "self", summary: "SUSE CVE CVE-2019-15902 page", url: "https://www.suse.com/security/cve/CVE-2019-15902/", }, { category: "self", summary: "SUSE CVE CVE-2019-15924 page", url: "https://www.suse.com/security/cve/CVE-2019-15924/", }, { category: "self", summary: "SUSE CVE CVE-2019-15926 page", url: "https://www.suse.com/security/cve/CVE-2019-15926/", }, { category: "self", summary: "SUSE CVE CVE-2019-15927 page", url: "https://www.suse.com/security/cve/CVE-2019-15927/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-16232 page", url: "https://www.suse.com/security/cve/CVE-2019-16232/", }, { category: "self", summary: "SUSE CVE CVE-2019-16233 page", url: "https://www.suse.com/security/cve/CVE-2019-16233/", }, { category: "self", summary: "SUSE CVE CVE-2019-16234 page", url: "https://www.suse.com/security/cve/CVE-2019-16234/", }, { category: "self", summary: "SUSE CVE CVE-2019-16413 page", url: "https://www.suse.com/security/cve/CVE-2019-16413/", }, { category: "self", summary: "SUSE CVE CVE-2019-16995 page", url: "https://www.suse.com/security/cve/CVE-2019-16995/", }, { category: "self", summary: "SUSE CVE CVE-2019-17055 page", url: "https://www.suse.com/security/cve/CVE-2019-17055/", }, { category: "self", summary: "SUSE CVE CVE-2019-17056 page", url: "https://www.suse.com/security/cve/CVE-2019-17056/", }, { category: "self", summary: "SUSE CVE CVE-2019-17133 page", url: "https://www.suse.com/security/cve/CVE-2019-17133/", }, { category: "self", summary: "SUSE CVE CVE-2019-17666 page", url: "https://www.suse.com/security/cve/CVE-2019-17666/", }, { category: "self", summary: "SUSE CVE CVE-2019-18680 page", url: "https://www.suse.com/security/cve/CVE-2019-18680/", }, { category: "self", summary: "SUSE CVE CVE-2019-18805 page", url: "https://www.suse.com/security/cve/CVE-2019-18805/", }, { category: "self", summary: "SUSE CVE CVE-2019-9456 page", url: "https://www.suse.com/security/cve/CVE-2019-9456/", }, { category: "self", summary: "SUSE CVE CVE-2019-9506 page", url: "https://www.suse.com/security/cve/CVE-2019-9506/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-11-20T10:32:05Z", generator: { date: "2019-11-20T10:32:05Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:2984-1", initial_release_date: "2019-11-20T10:32:05Z", revision_history: [ { date: "2019-11-20T10:32:05Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.125.1.aarch64", product: { name: "cluster-md-kmp-default-4.4.121-92.125.1.aarch64", product_id: "cluster-md-kmp-default-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.125.1.aarch64", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.125.1.aarch64", product_id: "cluster-md-kmp-vanilla-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.125.1.aarch64", product: { name: "cluster-network-kmp-default-4.4.121-92.125.1.aarch64", product_id: "cluster-network-kmp-default-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.125.1.aarch64", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.125.1.aarch64", product_id: "cluster-network-kmp-vanilla-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.125.1.aarch64", product: { name: "dlm-kmp-default-4.4.121-92.125.1.aarch64", product_id: "dlm-kmp-default-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.125.1.aarch64", product: { name: "dlm-kmp-vanilla-4.4.121-92.125.1.aarch64", product_id: "dlm-kmp-vanilla-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.125.1.aarch64", product: { name: "gfs2-kmp-default-4.4.121-92.125.1.aarch64", product_id: "gfs2-kmp-default-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", product: { name: "gfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", product_id: "gfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.125.1.aarch64", product: { name: "kernel-default-4.4.121-92.125.1.aarch64", product_id: "kernel-default-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.125.1.aarch64", product: { name: "kernel-default-base-4.4.121-92.125.1.aarch64", product_id: "kernel-default-base-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.125.1.aarch64", product: { name: "kernel-default-devel-4.4.121-92.125.1.aarch64", product_id: "kernel-default-devel-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.125.1.aarch64", product: { name: "kernel-default-extra-4.4.121-92.125.1.aarch64", product_id: "kernel-default-extra-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.125.1.aarch64", product: { name: "kernel-default-kgraft-4.4.121-92.125.1.aarch64", product_id: "kernel-default-kgraft-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.125.1.aarch64", product: { name: "kernel-obs-build-4.4.121-92.125.1.aarch64", product_id: "kernel-obs-build-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.125.1.aarch64", product: { name: "kernel-obs-qa-4.4.121-92.125.1.aarch64", product_id: "kernel-obs-qa-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.125.1.aarch64", product: { name: "kernel-syms-4.4.121-92.125.1.aarch64", product_id: "kernel-syms-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.125.1.aarch64", product: { name: "kernel-vanilla-4.4.121-92.125.1.aarch64", product_id: "kernel-vanilla-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.125.1.aarch64", product: { name: "kernel-vanilla-base-4.4.121-92.125.1.aarch64", product_id: "kernel-vanilla-base-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.125.1.aarch64", product: { name: "kernel-vanilla-devel-4.4.121-92.125.1.aarch64", product_id: "kernel-vanilla-devel-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.125.1.aarch64", product: { name: "ocfs2-kmp-default-4.4.121-92.125.1.aarch64", product_id: "ocfs2-kmp-default-4.4.121-92.125.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", product_id: "ocfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.4.121-92.125.1.noarch", product: { name: "kernel-devel-4.4.121-92.125.1.noarch", product_id: "kernel-devel-4.4.121-92.125.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.4.121-92.125.1.noarch", product: { name: "kernel-docs-4.4.121-92.125.1.noarch", product_id: "kernel-docs-4.4.121-92.125.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.4.121-92.125.1.noarch", product: { name: "kernel-docs-html-4.4.121-92.125.1.noarch", product_id: "kernel-docs-html-4.4.121-92.125.1.noarch", }, }, { category: "product_version", name: "kernel-docs-pdf-4.4.121-92.125.1.noarch", product: { name: "kernel-docs-pdf-4.4.121-92.125.1.noarch", product_id: "kernel-docs-pdf-4.4.121-92.125.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.4.121-92.125.1.noarch", product: { name: "kernel-macros-4.4.121-92.125.1.noarch", product_id: "kernel-macros-4.4.121-92.125.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.4.121-92.125.1.noarch", product: { name: "kernel-source-4.4.121-92.125.1.noarch", product_id: "kernel-source-4.4.121-92.125.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.4.121-92.125.1.noarch", product: { name: "kernel-source-vanilla-4.4.121-92.125.1.noarch", product_id: "kernel-source-vanilla-4.4.121-92.125.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.4.121-92.125.1.ppc64le", product: { name: "cluster-md-kmp-debug-4.4.121-92.125.1.ppc64le", product_id: "cluster-md-kmp-debug-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", product: { name: "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", product_id: "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.125.1.ppc64le", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.125.1.ppc64le", product_id: "cluster-md-kmp-vanilla-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-debug-4.4.121-92.125.1.ppc64le", product: { name: "cluster-network-kmp-debug-4.4.121-92.125.1.ppc64le", product_id: "cluster-network-kmp-debug-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", product: { name: "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", product_id: "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.125.1.ppc64le", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.125.1.ppc64le", product_id: "cluster-network-kmp-vanilla-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.121-92.125.1.ppc64le", product: { name: "dlm-kmp-debug-4.4.121-92.125.1.ppc64le", product_id: "dlm-kmp-debug-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.125.1.ppc64le", product: { name: "dlm-kmp-default-4.4.121-92.125.1.ppc64le", product_id: "dlm-kmp-default-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.125.1.ppc64le", product: { name: "dlm-kmp-vanilla-4.4.121-92.125.1.ppc64le", product_id: "dlm-kmp-vanilla-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.121-92.125.1.ppc64le", product: { name: "gfs2-kmp-debug-4.4.121-92.125.1.ppc64le", product_id: "gfs2-kmp-debug-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.125.1.ppc64le", product: { name: "gfs2-kmp-default-4.4.121-92.125.1.ppc64le", product_id: "gfs2-kmp-default-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", product: { name: "gfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", product_id: "gfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.4.121-92.125.1.ppc64le", product: { name: "kernel-debug-4.4.121-92.125.1.ppc64le", product_id: "kernel-debug-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.4.121-92.125.1.ppc64le", product: { name: "kernel-debug-base-4.4.121-92.125.1.ppc64le", product_id: "kernel-debug-base-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.121-92.125.1.ppc64le", product: { name: "kernel-debug-devel-4.4.121-92.125.1.ppc64le", product_id: "kernel-debug-devel-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.121-92.125.1.ppc64le", product: { name: "kernel-debug-extra-4.4.121-92.125.1.ppc64le", product_id: "kernel-debug-extra-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.121-92.125.1.ppc64le", product: { name: "kernel-debug-kgraft-4.4.121-92.125.1.ppc64le", product_id: "kernel-debug-kgraft-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.125.1.ppc64le", product: { name: "kernel-default-4.4.121-92.125.1.ppc64le", product_id: "kernel-default-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.125.1.ppc64le", product: { name: "kernel-default-base-4.4.121-92.125.1.ppc64le", product_id: "kernel-default-base-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.125.1.ppc64le", product: { name: "kernel-default-devel-4.4.121-92.125.1.ppc64le", product_id: "kernel-default-devel-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.125.1.ppc64le", product: { name: "kernel-default-extra-4.4.121-92.125.1.ppc64le", product_id: "kernel-default-extra-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.125.1.ppc64le", product: { name: "kernel-default-kgraft-4.4.121-92.125.1.ppc64le", product_id: "kernel-default-kgraft-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.125.1.ppc64le", product: { name: "kernel-obs-build-4.4.121-92.125.1.ppc64le", product_id: "kernel-obs-build-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.125.1.ppc64le", product: { name: "kernel-obs-qa-4.4.121-92.125.1.ppc64le", product_id: "kernel-obs-qa-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.125.1.ppc64le", product: { name: "kernel-syms-4.4.121-92.125.1.ppc64le", product_id: "kernel-syms-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.125.1.ppc64le", product: { name: "kernel-vanilla-4.4.121-92.125.1.ppc64le", product_id: "kernel-vanilla-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.125.1.ppc64le", product: { name: "kernel-vanilla-base-4.4.121-92.125.1.ppc64le", product_id: "kernel-vanilla-base-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.125.1.ppc64le", product: { name: "kernel-vanilla-devel-4.4.121-92.125.1.ppc64le", product_id: "kernel-vanilla-devel-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", product: { name: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", product_id: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.121-92.125.1.ppc64le", product: { name: "ocfs2-kmp-debug-4.4.121-92.125.1.ppc64le", product_id: "ocfs2-kmp-debug-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", product: { name: "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", product_id: "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", product_id: "ocfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.125.1.s390x", product: { name: "cluster-md-kmp-default-4.4.121-92.125.1.s390x", product_id: "cluster-md-kmp-default-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.125.1.s390x", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.125.1.s390x", product_id: "cluster-md-kmp-vanilla-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.125.1.s390x", product: { name: "cluster-network-kmp-default-4.4.121-92.125.1.s390x", product_id: "cluster-network-kmp-default-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.125.1.s390x", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.125.1.s390x", product_id: "cluster-network-kmp-vanilla-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.125.1.s390x", product: { name: "dlm-kmp-default-4.4.121-92.125.1.s390x", product_id: "dlm-kmp-default-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.125.1.s390x", product: { name: "dlm-kmp-vanilla-4.4.121-92.125.1.s390x", product_id: "dlm-kmp-vanilla-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.125.1.s390x", product: { name: "gfs2-kmp-default-4.4.121-92.125.1.s390x", product_id: "gfs2-kmp-default-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.125.1.s390x", product: { name: "gfs2-kmp-vanilla-4.4.121-92.125.1.s390x", product_id: "gfs2-kmp-vanilla-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.125.1.s390x", product: { name: "kernel-default-4.4.121-92.125.1.s390x", product_id: "kernel-default-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.125.1.s390x", product: { name: "kernel-default-base-4.4.121-92.125.1.s390x", product_id: "kernel-default-base-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.125.1.s390x", product: { name: "kernel-default-devel-4.4.121-92.125.1.s390x", product_id: "kernel-default-devel-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.125.1.s390x", product: { name: "kernel-default-extra-4.4.121-92.125.1.s390x", product_id: "kernel-default-extra-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.125.1.s390x", product: { name: "kernel-default-kgraft-4.4.121-92.125.1.s390x", product_id: "kernel-default-kgraft-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.4.121-92.125.1.s390x", product: { name: "kernel-default-man-4.4.121-92.125.1.s390x", product_id: "kernel-default-man-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.125.1.s390x", product: { name: "kernel-obs-build-4.4.121-92.125.1.s390x", product_id: "kernel-obs-build-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.125.1.s390x", product: { name: "kernel-obs-qa-4.4.121-92.125.1.s390x", product_id: "kernel-obs-qa-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.125.1.s390x", product: { name: "kernel-syms-4.4.121-92.125.1.s390x", product_id: "kernel-syms-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.125.1.s390x", product: { name: "kernel-vanilla-4.4.121-92.125.1.s390x", product_id: "kernel-vanilla-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.125.1.s390x", product: { name: "kernel-vanilla-base-4.4.121-92.125.1.s390x", product_id: "kernel-vanilla-base-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.125.1.s390x", product: { name: "kernel-vanilla-devel-4.4.121-92.125.1.s390x", product_id: "kernel-vanilla-devel-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.4.121-92.125.1.s390x", product: { name: "kernel-zfcpdump-4.4.121-92.125.1.s390x", product_id: "kernel-zfcpdump-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.125.1.s390x", product: { name: "ocfs2-kmp-default-4.4.121-92.125.1.s390x", product_id: "ocfs2-kmp-default-4.4.121-92.125.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.125.1.s390x", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.125.1.s390x", product_id: "ocfs2-kmp-vanilla-4.4.121-92.125.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.4.121-92.125.1.x86_64", product: { name: "cluster-md-kmp-debug-4.4.121-92.125.1.x86_64", product_id: "cluster-md-kmp-debug-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.125.1.x86_64", product: { name: "cluster-md-kmp-default-4.4.121-92.125.1.x86_64", product_id: "cluster-md-kmp-default-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.125.1.x86_64", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.125.1.x86_64", product_id: "cluster-md-kmp-vanilla-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-debug-4.4.121-92.125.1.x86_64", product: { name: "cluster-network-kmp-debug-4.4.121-92.125.1.x86_64", product_id: "cluster-network-kmp-debug-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.125.1.x86_64", product: { name: "cluster-network-kmp-default-4.4.121-92.125.1.x86_64", product_id: "cluster-network-kmp-default-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.125.1.x86_64", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.125.1.x86_64", product_id: "cluster-network-kmp-vanilla-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.121-92.125.1.x86_64", product: { name: "dlm-kmp-debug-4.4.121-92.125.1.x86_64", product_id: "dlm-kmp-debug-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.125.1.x86_64", product: { name: "dlm-kmp-default-4.4.121-92.125.1.x86_64", product_id: "dlm-kmp-default-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.125.1.x86_64", product: { name: "dlm-kmp-vanilla-4.4.121-92.125.1.x86_64", product_id: "dlm-kmp-vanilla-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.121-92.125.1.x86_64", product: { name: "gfs2-kmp-debug-4.4.121-92.125.1.x86_64", product_id: "gfs2-kmp-debug-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.125.1.x86_64", product: { name: "gfs2-kmp-default-4.4.121-92.125.1.x86_64", product_id: "gfs2-kmp-default-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", product: { name: "gfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", product_id: "gfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.4.121-92.125.1.x86_64", product: { name: "kernel-debug-4.4.121-92.125.1.x86_64", product_id: "kernel-debug-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.4.121-92.125.1.x86_64", product: { name: "kernel-debug-base-4.4.121-92.125.1.x86_64", product_id: "kernel-debug-base-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.121-92.125.1.x86_64", product: { name: "kernel-debug-devel-4.4.121-92.125.1.x86_64", product_id: "kernel-debug-devel-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.121-92.125.1.x86_64", product: { name: "kernel-debug-extra-4.4.121-92.125.1.x86_64", product_id: "kernel-debug-extra-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.121-92.125.1.x86_64", product: { name: "kernel-debug-kgraft-4.4.121-92.125.1.x86_64", product_id: "kernel-debug-kgraft-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.125.1.x86_64", product: { name: "kernel-default-4.4.121-92.125.1.x86_64", product_id: "kernel-default-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.125.1.x86_64", product: { name: "kernel-default-base-4.4.121-92.125.1.x86_64", product_id: "kernel-default-base-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.125.1.x86_64", product: { name: "kernel-default-devel-4.4.121-92.125.1.x86_64", product_id: "kernel-default-devel-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.125.1.x86_64", product: { name: "kernel-default-extra-4.4.121-92.125.1.x86_64", product_id: "kernel-default-extra-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.125.1.x86_64", product: { name: "kernel-default-kgraft-4.4.121-92.125.1.x86_64", product_id: "kernel-default-kgraft-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.125.1.x86_64", product: { name: "kernel-obs-build-4.4.121-92.125.1.x86_64", product_id: "kernel-obs-build-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.125.1.x86_64", product: { name: "kernel-obs-qa-4.4.121-92.125.1.x86_64", product_id: "kernel-obs-qa-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.125.1.x86_64", product: { name: "kernel-syms-4.4.121-92.125.1.x86_64", product_id: "kernel-syms-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.125.1.x86_64", product: { name: "kernel-vanilla-4.4.121-92.125.1.x86_64", product_id: "kernel-vanilla-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.125.1.x86_64", product: { name: "kernel-vanilla-base-4.4.121-92.125.1.x86_64", product_id: "kernel-vanilla-base-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.125.1.x86_64", product: { name: "kernel-vanilla-devel-4.4.121-92.125.1.x86_64", product_id: "kernel-vanilla-devel-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", product: { name: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", product_id: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.121-92.125.1.x86_64", product: { name: "ocfs2-kmp-debug-4.4.121-92.125.1.x86_64", product_id: "ocfs2-kmp-debug-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.125.1.x86_64", product: { name: "ocfs2-kmp-default-4.4.121-92.125.1.x86_64", product_id: "ocfs2-kmp-default-4.4.121-92.125.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", product_id: "ocfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", }, product_reference: "kernel-default-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", }, product_reference: "kernel-default-base-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", }, product_reference: "kernel-default-devel-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", }, product_reference: "kernel-default-man-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.125.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", }, product_reference: "kernel-source-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", }, product_reference: "kernel-syms-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", }, product_reference: "cluster-md-kmp-default-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", }, product_reference: "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", }, product_reference: "cluster-network-kmp-default-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", }, product_reference: "cluster-network-kmp-default-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", }, product_reference: "dlm-kmp-default-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", }, product_reference: "dlm-kmp-default-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", }, product_reference: "dlm-kmp-default-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", }, product_reference: "gfs2-kmp-default-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", }, product_reference: "gfs2-kmp-default-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", }, product_reference: "ocfs2-kmp-default-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", }, product_reference: "kernel-default-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", }, product_reference: "kernel-default-base-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", }, product_reference: "kernel-source-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", }, product_reference: "kernel-syms-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", }, product_reference: "kernel-default-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", }, product_reference: "kernel-default-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", }, product_reference: "kernel-default-base-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", }, product_reference: "kernel-default-base-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", }, product_reference: "kernel-default-devel-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", }, product_reference: "kernel-default-man-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", }, product_reference: "kernel-source-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", }, product_reference: "kernel-syms-4.4.121-92.125.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", }, product_reference: "kernel-syms-4.4.121-92.125.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", }, product_reference: "kernel-source-4.4.121-92.125.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.125.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10906", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10906", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10906", url: "https://www.suse.com/security/cve/CVE-2016-10906", }, { category: "external", summary: "SUSE Bug 1146584 for CVE-2016-10906", url: "https://bugzilla.suse.com/1146584", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2016-10906", }, { cve: "CVE-2017-18509", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18509", }, ], notes: [ { category: "general", text: "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18509", url: "https://www.suse.com/security/cve/CVE-2017-18509", }, { category: "external", summary: "SUSE Bug 1145477 for CVE-2017-18509", url: "https://bugzilla.suse.com/1145477", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2017-18509", }, { cve: "CVE-2017-18595", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18595", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18595", url: "https://www.suse.com/security/cve/CVE-2017-18595", }, { category: "external", summary: "SUSE Bug 1149555 for CVE-2017-18595", url: "https://bugzilla.suse.com/1149555", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2017-18595", }, { cve: "CVE-2018-12207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12207", }, ], notes: [ { category: "general", text: "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12207", url: "https://www.suse.com/security/cve/CVE-2018-12207", }, { category: "external", summary: "SUSE Bug 1117665 for CVE-2018-12207", url: "https://bugzilla.suse.com/1117665", }, { category: "external", summary: "SUSE Bug 1139073 for CVE-2018-12207", url: "https://bugzilla.suse.com/1139073", }, { category: "external", summary: "SUSE Bug 1152505 for CVE-2018-12207", url: "https://bugzilla.suse.com/1152505", }, { category: "external", summary: "SUSE Bug 1155812 for CVE-2018-12207", url: "https://bugzilla.suse.com/1155812", }, { category: "external", summary: "SUSE Bug 1155817 for CVE-2018-12207", url: "https://bugzilla.suse.com/1155817", }, { category: "external", summary: "SUSE Bug 1155945 for CVE-2018-12207", url: "https://bugzilla.suse.com/1155945", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-12207", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-12207", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2018-12207", }, { cve: "CVE-2018-20976", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20976", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20976", url: "https://www.suse.com/security/cve/CVE-2018-20976", }, { category: "external", summary: "SUSE Bug 1146285 for CVE-2018-20976", url: "https://bugzilla.suse.com/1146285", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2018-20976", }, { cve: "CVE-2019-0154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0154", }, ], notes: [ { category: "general", text: "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0154", url: "https://www.suse.com/security/cve/CVE-2019-0154", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0154", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2019-0154", url: "https://bugzilla.suse.com/1181720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-0154", }, { cve: "CVE-2019-0155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0155", }, ], notes: [ { category: "general", text: "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0155", url: "https://www.suse.com/security/cve/CVE-2019-0155", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1135967 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135967", }, { category: "external", summary: "SUSE Bug 1173663 for CVE-2019-0155", url: "https://bugzilla.suse.com/1173663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-0155", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-11135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11135", }, ], notes: [ { category: "general", text: "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11135", url: "https://www.suse.com/security/cve/CVE-2019-11135", }, { category: "external", summary: "SUSE Bug 1139073 for CVE-2019-11135", url: "https://bugzilla.suse.com/1139073", }, { category: "external", summary: "SUSE Bug 1152497 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152497", }, { category: "external", summary: "SUSE Bug 1152505 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152505", }, { category: "external", summary: "SUSE Bug 1152506 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152506", }, { category: "external", summary: "SUSE Bug 1160120 for CVE-2019-11135", url: "https://bugzilla.suse.com/1160120", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2019-11135", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-11135", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-14814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14814", }, ], notes: [ { category: "general", text: "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14814", url: "https://www.suse.com/security/cve/CVE-2019-14814", }, { category: "external", summary: "SUSE Bug 1146512 for CVE-2019-14814", url: "https://bugzilla.suse.com/1146512", }, { category: "external", summary: "SUSE Bug 1173664 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173664", }, { category: "external", summary: "SUSE Bug 1173665 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-14814", }, { cve: "CVE-2019-14815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14815", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14815", url: "https://www.suse.com/security/cve/CVE-2019-14815", }, { category: "external", summary: "SUSE Bug 1146514 for CVE-2019-14815", url: "https://bugzilla.suse.com/1146514", }, { category: "external", summary: "SUSE Bug 1173665 for CVE-2019-14815", url: "https://bugzilla.suse.com/1173665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-14815", }, { cve: "CVE-2019-14816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14816", }, ], notes: [ { category: "general", text: "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14816", url: "https://www.suse.com/security/cve/CVE-2019-14816", }, { category: "external", summary: "SUSE Bug 1146516 for CVE-2019-14816", url: "https://bugzilla.suse.com/1146516", }, { category: "external", summary: "SUSE Bug 1173666 for CVE-2019-14816", url: "https://bugzilla.suse.com/1173666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-14816", }, { cve: "CVE-2019-14821", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14821", }, ], notes: [ { category: "general", text: "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14821", url: "https://www.suse.com/security/cve/CVE-2019-14821", }, { category: "external", summary: "SUSE Bug 1151350 for CVE-2019-14821", url: "https://bugzilla.suse.com/1151350", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2019-14821", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-14821", }, { cve: "CVE-2019-14835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14835", }, ], notes: [ { category: "general", text: "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14835", url: "https://www.suse.com/security/cve/CVE-2019-14835", }, { category: "external", summary: "SUSE Bug 1150112 for CVE-2019-14835", url: "https://bugzilla.suse.com/1150112", }, { category: "external", summary: "SUSE Bug 1151021 for CVE-2019-14835", url: "https://bugzilla.suse.com/1151021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-14835", }, { cve: "CVE-2019-15098", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15098", }, ], notes: [ { category: "general", text: "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15098", url: "https://www.suse.com/security/cve/CVE-2019-15098", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146543", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15098", }, { cve: "CVE-2019-15211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15211", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15211", url: "https://www.suse.com/security/cve/CVE-2019-15211", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15211", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15211", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15211", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15211", }, { cve: "CVE-2019-15212", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15212", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15212", url: "https://www.suse.com/security/cve/CVE-2019-15212", }, { category: "external", summary: "SUSE Bug 1146391 for CVE-2019-15212", url: "https://bugzilla.suse.com/1146391", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15212", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15212", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15212", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15212", }, { cve: "CVE-2019-15214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15214", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15214", url: "https://www.suse.com/security/cve/CVE-2019-15214", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15214", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146550 for CVE-2019-15214", url: "https://bugzilla.suse.com/1146550", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15214", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15214", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "low", }, ], title: "CVE-2019-15214", }, { cve: "CVE-2019-15215", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15215", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15215", url: "https://www.suse.com/security/cve/CVE-2019-15215", }, { category: "external", summary: "SUSE Bug 1146425 for CVE-2019-15215", url: "https://bugzilla.suse.com/1146425", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15215", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15215", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15215", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15215", }, { cve: "CVE-2019-15216", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15216", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15216", url: "https://www.suse.com/security/cve/CVE-2019-15216", }, { category: "external", summary: "SUSE Bug 1146361 for CVE-2019-15216", url: "https://bugzilla.suse.com/1146361", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15216", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15216", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15216", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15216", }, { cve: "CVE-2019-15217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15217", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15217", url: "https://www.suse.com/security/cve/CVE-2019-15217", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15217", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146547 for CVE-2019-15217", url: "https://bugzilla.suse.com/1146547", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15217", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15217", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15217", }, { cve: "CVE-2019-15218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15218", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15218", url: "https://www.suse.com/security/cve/CVE-2019-15218", }, { category: "external", summary: "SUSE Bug 1146413 for CVE-2019-15218", url: "https://bugzilla.suse.com/1146413", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15218", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15218", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15218", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15218", }, { cve: "CVE-2019-15219", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15219", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15219", url: "https://www.suse.com/security/cve/CVE-2019-15219", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15219", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146524 for CVE-2019-15219", url: "https://bugzilla.suse.com/1146524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15219", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15219", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15219", }, { cve: "CVE-2019-15220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15220", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15220", url: "https://www.suse.com/security/cve/CVE-2019-15220", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15220", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146526 for CVE-2019-15220", url: "https://bugzilla.suse.com/1146526", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15220", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15220", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15220", }, { cve: "CVE-2019-15221", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15221", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15221", url: "https://www.suse.com/security/cve/CVE-2019-15221", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15221", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146529 for CVE-2019-15221", url: "https://bugzilla.suse.com/1146529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15221", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15221", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15221", }, { cve: "CVE-2019-15290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15290", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15290", url: "https://www.suse.com/security/cve/CVE-2019-15290", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146543", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15290", }, { cve: "CVE-2019-15291", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15291", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15291", url: "https://www.suse.com/security/cve/CVE-2019-15291", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15291", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146540 for CVE-2019-15291", url: "https://bugzilla.suse.com/1146540", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15291", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15291", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15291", }, { cve: "CVE-2019-15505", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15505", }, ], notes: [ { category: "general", text: "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15505", url: "https://www.suse.com/security/cve/CVE-2019-15505", }, { category: "external", summary: "SUSE Bug 1147122 for CVE-2019-15505", url: "https://bugzilla.suse.com/1147122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15505", }, { cve: "CVE-2019-15666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15666", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15666", url: "https://www.suse.com/security/cve/CVE-2019-15666", }, { category: "external", summary: "SUSE Bug 1148394 for CVE-2019-15666", url: "https://bugzilla.suse.com/1148394", }, { category: "external", summary: "SUSE Bug 1172140 for CVE-2019-15666", url: "https://bugzilla.suse.com/1172140", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-15666", }, { cve: "CVE-2019-15807", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15807", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15807", url: "https://www.suse.com/security/cve/CVE-2019-15807", }, { category: "external", summary: "SUSE Bug 1148938 for CVE-2019-15807", url: "https://bugzilla.suse.com/1148938", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15807", }, { cve: "CVE-2019-15902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15902", }, ], notes: [ { category: "general", text: "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15902", url: "https://www.suse.com/security/cve/CVE-2019-15902", }, { category: "external", summary: "SUSE Bug 1149376 for CVE-2019-15902", url: "https://bugzilla.suse.com/1149376", }, { category: "external", summary: "SUSE Bug 1155131 for CVE-2019-15902", url: "https://bugzilla.suse.com/1155131", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15902", }, { cve: "CVE-2019-15924", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15924", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15924", url: "https://www.suse.com/security/cve/CVE-2019-15924", }, { category: "external", summary: "SUSE Bug 1149612 for CVE-2019-15924", url: "https://bugzilla.suse.com/1149612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "low", }, ], title: "CVE-2019-15924", }, { cve: "CVE-2019-15926", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15926", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15926", url: "https://www.suse.com/security/cve/CVE-2019-15926", }, { category: "external", summary: "SUSE Bug 1149527 for CVE-2019-15926", url: "https://bugzilla.suse.com/1149527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15926", }, { cve: "CVE-2019-15927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15927", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15927", url: "https://www.suse.com/security/cve/CVE-2019-15927", }, { category: "external", summary: "SUSE Bug 1149522 for CVE-2019-15927", url: "https://bugzilla.suse.com/1149522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-15927", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-16232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16232", }, ], notes: [ { category: "general", text: "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16232", url: "https://www.suse.com/security/cve/CVE-2019-16232", }, { category: "external", summary: "SUSE Bug 1150465 for CVE-2019-16232", url: "https://bugzilla.suse.com/1150465", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "low", }, ], title: "CVE-2019-16232", }, { cve: "CVE-2019-16233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16233", }, ], notes: [ { category: "general", text: "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16233", url: "https://www.suse.com/security/cve/CVE-2019-16233", }, { category: "external", summary: "SUSE Bug 1150457 for CVE-2019-16233", url: "https://bugzilla.suse.com/1150457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "low", }, ], title: "CVE-2019-16233", }, { cve: "CVE-2019-16234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16234", }, ], notes: [ { category: "general", text: "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16234", url: "https://www.suse.com/security/cve/CVE-2019-16234", }, { category: "external", summary: "SUSE Bug 1150452 for CVE-2019-16234", url: "https://bugzilla.suse.com/1150452", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "low", }, ], title: "CVE-2019-16234", }, { cve: "CVE-2019-16413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16413", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16413", url: "https://www.suse.com/security/cve/CVE-2019-16413", }, { category: "external", summary: "SUSE Bug 1151347 for CVE-2019-16413", url: "https://bugzilla.suse.com/1151347", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-16413", }, { cve: "CVE-2019-16995", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16995", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16995", url: "https://www.suse.com/security/cve/CVE-2019-16995", }, { category: "external", summary: "SUSE Bug 1152685 for CVE-2019-16995", url: "https://bugzilla.suse.com/1152685", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-16995", }, { cve: "CVE-2019-17055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17055", }, ], notes: [ { category: "general", text: "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17055", url: "https://www.suse.com/security/cve/CVE-2019-17055", }, { category: "external", summary: "SUSE Bug 1152782 for CVE-2019-17055", url: "https://bugzilla.suse.com/1152782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "low", }, ], title: "CVE-2019-17055", }, { cve: "CVE-2019-17056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17056", }, ], notes: [ { category: "general", text: "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17056", url: "https://www.suse.com/security/cve/CVE-2019-17056", }, { category: "external", summary: "SUSE Bug 1152788 for CVE-2019-17056", url: "https://bugzilla.suse.com/1152788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-17056", }, { cve: "CVE-2019-17133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17133", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17133", url: "https://www.suse.com/security/cve/CVE-2019-17133", }, { category: "external", summary: "SUSE Bug 1153158 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153158", }, { category: "external", summary: "SUSE Bug 1153161 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-17133", }, { cve: "CVE-2019-17666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17666", }, ], notes: [ { category: "general", text: "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17666", url: "https://www.suse.com/security/cve/CVE-2019-17666", }, { category: "external", summary: "SUSE Bug 1154372 for CVE-2019-17666", url: "https://bugzilla.suse.com/1154372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-17666", }, { cve: "CVE-2019-18680", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18680", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18680", url: "https://www.suse.com/security/cve/CVE-2019-18680", }, { category: "external", summary: "SUSE Bug 1155898 for CVE-2019-18680", url: "https://bugzilla.suse.com/1155898", }, { category: "external", summary: "SUSE Bug 1173867 for CVE-2019-18680", url: "https://bugzilla.suse.com/1173867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "important", }, ], title: "CVE-2019-18680", }, { cve: "CVE-2019-18805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18805", }, ], notes: [ { category: "general", text: "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18805", url: "https://www.suse.com/security/cve/CVE-2019-18805", }, { category: "external", summary: "SUSE Bug 1156187 for CVE-2019-18805", url: "https://bugzilla.suse.com/1156187", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "low", }, ], title: "CVE-2019-18805", }, { cve: "CVE-2019-9456", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9456", }, ], notes: [ { category: "general", text: "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9456", url: "https://www.suse.com/security/cve/CVE-2019-9456", }, { category: "external", summary: "SUSE Bug 1150025 for CVE-2019-9456", url: "https://bugzilla.suse.com/1150025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-9456", }, { cve: "CVE-2019-9506", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9506", }, ], notes: [ { category: "general", text: "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9506", url: "https://www.suse.com/security/cve/CVE-2019-9506", }, { category: "external", summary: "SUSE Bug 1137865 for CVE-2019-9506", url: "https://bugzilla.suse.com/1137865", }, { category: "external", summary: "SUSE Bug 1146042 for CVE-2019-9506", url: "https://bugzilla.suse.com/1146042", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-20T10:32:05Z", details: "moderate", }, ], title: "CVE-2019-9506", }, ], }
suse-su-2019:3225-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP4)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.12.14-95_16 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3225,SUSE-SLE-Live-Patching-12-SP4-2019-3225", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3225-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3225-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193225-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3225-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006223.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, ], title: "Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP4)", tracking: { current_release_date: "2019-12-10T09:13:14Z", generator: { date: "2019-12-10T09:13:14Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3225-1", initial_release_date: "2019-12-10T09:13:14Z", revision_history: [ { date: "2019-12-10T09:13:14Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", product: { name: "kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", product_id: "kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", product: { name: "kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", product_id: "kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:13:14Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-6-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:13:14Z", details: "important", }, ], title: "CVE-2019-13272", }, ], }
suse-su-2019:3230-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.4.180-94_103 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n\nThe following bugs were fixed:\n\n- Fixed boot up hang revealed by int3 self test (bsc#1157770).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3230,SUSE-SLE-Live-Patching-12-SP4-2019-3226,SUSE-SLE-Module-Live-Patching-15-SP1-2019-3218,SUSE-SLE-SAP-12-SP3-2019-3230,SUSE-SLE-SERVER-12-SP3-2019-3230", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3230-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3230-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193230-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3230-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156317", url: "https://bugzilla.suse.com/1156317", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1157770", url: "https://bugzilla.suse.com/1157770", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-15239 page", url: "https://www.suse.com/security/cve/CVE-2019-15239/", }, ], title: "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)", tracking: { current_release_date: "2019-12-10T09:16:32Z", generator: { date: "2019-12-10T09:16:32Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3230-1", initial_release_date: "2019-12-10T09:16:32Z", revision_history: [ { date: "2019-12-10T09:16:32Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", product: { name: "kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", product_id: "kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", product: { name: "kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", product_id: "kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", product_id: "kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", product: { name: "kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", product_id: "kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", product: { name: "kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", product_id: "kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", product: { name: "kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", product_id: "kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP1", product: { name: "SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:16:32Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:16:32Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-15239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15239", }, ], notes: [ { category: "general", text: "In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15239", url: "https://www.suse.com/security/cve/CVE-2019-15239", }, { category: "external", summary: "SUSE Bug 1146589 for CVE-2019-15239", url: "https://bugzilla.suse.com/1146589", }, { category: "external", summary: "SUSE Bug 1156317 for CVE-2019-15239", url: "https://bugzilla.suse.com/1156317", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_7-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-4-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:16:32Z", details: "important", }, ], title: "CVE-2019-15239", }, ], }
suse-su-2019:3260-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.4.121-92_109 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331). \n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321). \n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108). \n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3260,SUSE-SLE-SAP-12-SP2-2019-3259,SUSE-SLE-SAP-12-SP2-2019-3260,SUSE-SLE-SERVER-12-SP2-2019-3259,SUSE-SLE-SERVER-12-SP2-2019-3260", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3260-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3260-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193260-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3260-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156331", url: "https://bugzilla.suse.com/1156331", }, { category: "self", summary: "SUSE CVE CVE-2018-20856 page", url: "https://www.suse.com/security/cve/CVE-2018-20856/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, ], title: "Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2)", tracking: { current_release_date: "2019-12-11T10:13:46Z", generator: { date: "2019-12-11T10:13:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3260-1", initial_release_date: "2019-12-11T10:13:46Z", revision_history: [ { date: "2019-12-11T10:13:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", product: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", product_id: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", product: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", product_id: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", product: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", product_id: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", product: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", product_id: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-20856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20856", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20856", url: "https://www.suse.com/security/cve/CVE-2018-20856", }, { category: "external", summary: "SUSE Bug 1143048 for CVE-2018-20856", url: "https://bugzilla.suse.com/1143048", }, { category: "external", summary: "SUSE Bug 1156331 for CVE-2018-20856", url: "https://bugzilla.suse.com/1156331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:13:46Z", details: "moderate", }, ], title: "CVE-2018-20856", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:13:46Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:13:46Z", details: "important", }, ], title: "CVE-2019-13272", }, ], }
suse-su-2019:3247-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 9 for SLE 15)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.12.14-150_14 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3247,SUSE-SLE-Module-Live-Patching-15-2019-3247", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3247-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3247-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193247-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3247-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156334", url: "https://bugzilla.suse.com/1156334", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-15917 page", url: "https://www.suse.com/security/cve/CVE-2019-15917/", }, ], title: "Security update for the Linux Kernel (Live Patch 9 for SLE 15)", tracking: { current_release_date: "2019-12-11T10:05:27Z", generator: { date: "2019-12-11T10:05:27Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3247-1", initial_release_date: "2019-12-11T10:05:27Z", revision_history: [ { date: "2019-12-11T10:05:27Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", product: { name: "kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", product_id: "kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", product: { name: "kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", product_id: "kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15", product: { name: "SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", }, product_reference: "kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, ], }, vulnerabilities: [ { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:05:27Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:05:27Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-15917", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15917", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15917", url: "https://www.suse.com/security/cve/CVE-2019-15917", }, { category: "external", summary: "SUSE Bug 1149539 for CVE-2019-15917", url: "https://bugzilla.suse.com/1149539", }, { category: "external", summary: "SUSE Bug 1156334 for CVE-2019-15917", url: "https://bugzilla.suse.com/1156334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-6-2.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:05:27Z", details: "moderate", }, ], title: "CVE-2019-15917", }, ], }
suse-su-2019:3246-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 8 for SLE 15)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.12.14-25_28 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a \n null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server\n (bsc#1156320).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3246,SUSE-SLE-Module-Live-Patching-15-2019-3246", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3246-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3246-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193246-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3246-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156320", url: "https://bugzilla.suse.com/1156320", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156334", url: "https://bugzilla.suse.com/1156334", }, { category: "self", summary: "SUSE CVE CVE-2018-16871 page", url: "https://www.suse.com/security/cve/CVE-2018-16871/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-15917 page", url: "https://www.suse.com/security/cve/CVE-2019-15917/", }, ], title: "Security update for the Linux Kernel (Live Patch 8 for SLE 15)", tracking: { current_release_date: "2019-12-11T10:04:48Z", generator: { date: "2019-12-11T10:04:48Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3246-1", initial_release_date: "2019-12-11T10:04:48Z", revision_history: [ { date: "2019-12-11T10:04:48Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", product: { name: "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", product_id: "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", product: { name: "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", product_id: "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15", product: { name: "SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", }, product_reference: "kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16871", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16871", url: "https://www.suse.com/security/cve/CVE-2018-16871", }, { category: "external", summary: "SUSE Bug 1137103 for CVE-2018-16871", url: "https://bugzilla.suse.com/1137103", }, { category: "external", summary: "SUSE Bug 1156320 for CVE-2018-16871", url: "https://bugzilla.suse.com/1156320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:04:48Z", details: "important", }, ], title: "CVE-2018-16871", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:04:48Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:04:48Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-15917", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15917", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15917", url: "https://www.suse.com/security/cve/CVE-2019-15917", }, { category: "external", summary: "SUSE Bug 1149539 for CVE-2019-15917", url: "https://bugzilla.suse.com/1149539", }, { category: "external", summary: "SUSE Bug 1156334 for CVE-2019-15917", url: "https://bugzilla.suse.com/1156334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-7-2.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:04:48Z", details: "moderate", }, ], title: "CVE-2019-15917", }, ], }
suse-su-2019:3252-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP4)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.12.14-95_3 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).\n- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a \n null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server\n (bsc#1156320). \n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3252,SUSE-SLE-Live-Patching-12-SP4-2019-3252,SUSE-SLE-Live-Patching-12-SP4-2019-3253", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3252-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3252-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193252-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3252-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156320", url: "https://bugzilla.suse.com/1156320", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156331", url: "https://bugzilla.suse.com/1156331", }, { category: "self", summary: "SUSE Bug 1156334", url: "https://bugzilla.suse.com/1156334", }, { category: "self", summary: "SUSE CVE CVE-2018-16871 page", url: "https://www.suse.com/security/cve/CVE-2018-16871/", }, { category: "self", summary: "SUSE CVE CVE-2018-20856 page", url: "https://www.suse.com/security/cve/CVE-2018-20856/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-15917 page", url: "https://www.suse.com/security/cve/CVE-2019-15917/", }, ], title: "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP4)", tracking: { current_release_date: "2019-12-11T10:09:04Z", generator: { date: "2019-12-11T10:09:04Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3252-1", initial_release_date: "2019-12-11T10:09:04Z", revision_history: [ { date: "2019-12-11T10:09:04Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", product: { name: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", product_id: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", product: { name: "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", product_id: "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", product: { name: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", product_id: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", product: { name: "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", product_id: "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16871", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16871", url: "https://www.suse.com/security/cve/CVE-2018-16871", }, { category: "external", summary: "SUSE Bug 1137103 for CVE-2018-16871", url: "https://bugzilla.suse.com/1137103", }, { category: "external", summary: "SUSE Bug 1156320 for CVE-2018-16871", url: "https://bugzilla.suse.com/1156320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:09:04Z", details: "important", }, ], title: "CVE-2018-16871", }, { cve: "CVE-2018-20856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20856", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20856", url: "https://www.suse.com/security/cve/CVE-2018-20856", }, { category: "external", summary: "SUSE Bug 1143048 for CVE-2018-20856", url: "https://bugzilla.suse.com/1143048", }, { category: "external", summary: "SUSE Bug 1156331 for CVE-2018-20856", url: "https://bugzilla.suse.com/1156331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:09:04Z", details: "moderate", }, ], title: "CVE-2018-20856", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:09:04Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:09:04Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-15917", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15917", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15917", url: "https://www.suse.com/security/cve/CVE-2019-15917", }, { category: "external", summary: "SUSE Bug 1149539 for CVE-2019-15917", url: "https://bugzilla.suse.com/1149539", }, { category: "external", summary: "SUSE Bug 1156334 for CVE-2019-15917", url: "https://bugzilla.suse.com/1156334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-9-2.25.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-8-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:09:04Z", details: "moderate", }, ], title: "CVE-2019-15917", }, ], }
suse-su-2019:3223-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.12.14-95_6 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a \n null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server\n (bsc#1156320). \n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3223,SUSE-SLE-Live-Patching-12-SP4-2019-3223", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3223-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3223-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193223-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3223-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156320", url: "https://bugzilla.suse.com/1156320", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156334", url: "https://bugzilla.suse.com/1156334", }, { category: "self", summary: "SUSE CVE CVE-2018-16871 page", url: "https://www.suse.com/security/cve/CVE-2018-16871/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-15917 page", url: "https://www.suse.com/security/cve/CVE-2019-15917/", }, ], title: "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)", tracking: { current_release_date: "2019-12-10T09:12:02Z", generator: { date: "2019-12-10T09:12:02Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3223-1", initial_release_date: "2019-12-10T09:12:02Z", revision_history: [ { date: "2019-12-10T09:12:02Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", product: { name: "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", product_id: "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", product: { name: "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", product_id: "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16871", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16871", url: "https://www.suse.com/security/cve/CVE-2018-16871", }, { category: "external", summary: "SUSE Bug 1137103 for CVE-2018-16871", url: "https://bugzilla.suse.com/1137103", }, { category: "external", summary: "SUSE Bug 1156320 for CVE-2018-16871", url: "https://bugzilla.suse.com/1156320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:12:02Z", details: "important", }, ], title: "CVE-2018-16871", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:12:02Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:12:02Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-15917", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15917", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15917", url: "https://www.suse.com/security/cve/CVE-2019-15917", }, { category: "external", summary: "SUSE Bug 1149539 for CVE-2019-15917", url: "https://bugzilla.suse.com/1149539", }, { category: "external", summary: "SUSE Bug 1156334 for CVE-2019-15917", url: "https://bugzilla.suse.com/1156334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:12:02Z", details: "moderate", }, ], title: "CVE-2019-15917", }, ], }
suse-su-2019:3232-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.4.121-92_101 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331). \n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by \n leveraging certain scenarios with a parent-child process relationship (bsc#1156321). \n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108). \n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3232,SUSE-SLE-SAP-12-SP2-2019-3232,SUSE-SLE-SERVER-12-SP2-2019-3232", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3232-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3232-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193232-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3232-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156331", url: "https://bugzilla.suse.com/1156331", }, { category: "self", summary: "SUSE CVE CVE-2018-20856 page", url: "https://www.suse.com/security/cve/CVE-2018-20856/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, ], title: "Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2)", tracking: { current_release_date: "2019-12-10T09:17:52Z", generator: { date: "2019-12-10T09:17:52Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3232-1", initial_release_date: "2019-12-10T09:17:52Z", revision_history: [ { date: "2019-12-10T09:17:52Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", product: { name: "kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", product_id: "kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", product: { name: "kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", product_id: "kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-20856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20856", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20856", url: "https://www.suse.com/security/cve/CVE-2018-20856", }, { category: "external", summary: "SUSE Bug 1143048 for CVE-2018-20856", url: "https://bugzilla.suse.com/1143048", }, { category: "external", summary: "SUSE Bug 1156331 for CVE-2018-20856", url: "https://bugzilla.suse.com/1156331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:17:52Z", details: "moderate", }, ], title: "CVE-2018-20856", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:17:52Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-7-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:17:52Z", details: "important", }, ], title: "CVE-2019-13272", }, ], }
suse-su-2019:3258-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.4.178-94_91 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions \n resulted in privilege escalation (bsc#1156317).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3258,SUSE-SLE-SAP-12-SP3-2019-3256,SUSE-SLE-SAP-12-SP3-2019-3257,SUSE-SLE-SAP-12-SP3-2019-3258,SUSE-SLE-SERVER-12-SP3-2019-3256,SUSE-SLE-SERVER-12-SP3-2019-3257,SUSE-SLE-SERVER-12-SP3-2019-3258", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3258-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3258-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193258-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3258-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156317", url: "https://bugzilla.suse.com/1156317", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156331", url: "https://bugzilla.suse.com/1156331", }, { category: "self", summary: "SUSE CVE CVE-2018-20856 page", url: "https://www.suse.com/security/cve/CVE-2018-20856/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-15239 page", url: "https://www.suse.com/security/cve/CVE-2019-15239/", }, ], title: "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)", tracking: { current_release_date: "2019-12-11T10:12:24Z", generator: { date: "2019-12-11T10:12:24Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3258-1", initial_release_date: "2019-12-11T10:12:24Z", revision_history: [ { date: "2019-12-11T10:12:24Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", product: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", product_id: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", product: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", product_id: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", product: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", product_id: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", product: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", product_id: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", product: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", product_id: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", product: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", product_id: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-20856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20856", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20856", url: "https://www.suse.com/security/cve/CVE-2018-20856", }, { category: "external", summary: "SUSE Bug 1143048 for CVE-2018-20856", url: "https://bugzilla.suse.com/1143048", }, { category: "external", summary: "SUSE Bug 1156331 for CVE-2018-20856", url: "https://bugzilla.suse.com/1156331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:12:24Z", details: "moderate", }, ], title: "CVE-2018-20856", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:12:24Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:12:24Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-15239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15239", }, ], notes: [ { category: "general", text: "In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15239", url: "https://www.suse.com/security/cve/CVE-2019-15239", }, { category: "external", summary: "SUSE Bug 1146589 for CVE-2019-15239", url: "https://bugzilla.suse.com/1146589", }, { category: "external", summary: "SUSE Bug 1156317 for CVE-2019-15239", url: "https://bugzilla.suse.com/1156317", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-7-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-6-2.5.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-6-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:12:24Z", details: "important", }, ], title: "CVE-2019-15239", }, ], }
suse-su-2019:3248-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.12.14-195 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3248,SUSE-SLE-Module-Live-Patching-15-2019-3248,SUSE-SLE-Module-Live-Patching-15-SP1-2019-3250", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3248-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3248-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193248-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3248-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006242.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, ], title: "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)", tracking: { current_release_date: "2019-12-11T10:07:16Z", generator: { date: "2019-12-11T10:07:16Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3248-1", initial_release_date: "2019-12-11T10:07:16Z", revision_history: [ { date: "2019-12-11T10:07:16Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", product: { name: "kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", product_id: "kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", product: { name: "kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", product_id: "kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", product: { name: "kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", product_id: "kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", product: { name: "kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", product_id: "kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15", product: { name: "SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP1", product: { name: "SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", }, product_reference: "kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-195-default-8-22.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", }, product_reference: "kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:07:16Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-8-22.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-6-2.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:07:16Z", details: "important", }, ], title: "CVE-2019-13272", }, ], }
suse-su-2019:3249-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP1)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.12.14-197_4 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n\nThe following bugs were fixed:\n\n- Fixed boot up hang revealed by int3 self test (bsc#1157770).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3249,SUSE-SLE-Live-Patching-12-SP4-2019-3254,SUSE-SLE-Module-Live-Patching-15-2019-3249,SUSE-SLE-Module-Live-Patching-15-SP1-2019-3251", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3249-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3249-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193249-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3249-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156317", url: "https://bugzilla.suse.com/1156317", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1157770", url: "https://bugzilla.suse.com/1157770", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-15239 page", url: "https://www.suse.com/security/cve/CVE-2019-15239/", }, ], title: "Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP1)", tracking: { current_release_date: "2019-12-11T10:07:51Z", generator: { date: "2019-12-11T10:07:51Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3249-1", initial_release_date: "2019-12-11T10:07:51Z", revision_history: [ { date: "2019-12-11T10:07:51Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", product_id: "kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", product: { name: "kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", product_id: "kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", product_id: "kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", product: { name: "kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", product_id: "kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", product: { name: "kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", product_id: "kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", product: { name: "kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", product_id: "kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15", product: { name: "SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP1", product: { name: "SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:07:51Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:07:51Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-15239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15239", }, ], notes: [ { category: "general", text: "In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15239", url: "https://www.suse.com/security/cve/CVE-2019-15239", }, { category: "external", summary: "SUSE Bug 1146589 for CVE-2019-15239", url: "https://bugzilla.suse.com/1146589", }, { category: "external", summary: "SUSE Bug 1156317 for CVE-2019-15239", url: "https://bugzilla.suse.com/1156317", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-5-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:07:51Z", details: "important", }, ], title: "CVE-2019-15239", }, ], }
suse-su-2019:3261-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.4.121-92_117 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n\nThe following bugs were fixed:\n\n- Fixed boot up hang revealed by int3 self test (bsc#1157770).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3261,SUSE-SLE-SAP-12-SP2-2019-3261,SUSE-SLE-SAP-12-SP2-2019-3262,SUSE-SLE-SERVER-12-SP2-2019-3261,SUSE-SLE-SERVER-12-SP2-2019-3262", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3261-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3261-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193261-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3261-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156331", url: "https://bugzilla.suse.com/1156331", }, { category: "self", summary: "SUSE Bug 1157770", url: "https://bugzilla.suse.com/1157770", }, { category: "self", summary: "SUSE CVE CVE-2018-20856 page", url: "https://www.suse.com/security/cve/CVE-2018-20856/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, ], title: "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2)", tracking: { current_release_date: "2019-12-11T10:15:07Z", generator: { date: "2019-12-11T10:15:07Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3261-1", initial_release_date: "2019-12-11T10:15:07Z", revision_history: [ { date: "2019-12-11T10:15:07Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", product: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", product_id: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", product: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", product_id: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", product: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", product_id: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", product: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", product_id: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-20856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20856", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20856", url: "https://www.suse.com/security/cve/CVE-2018-20856", }, { category: "external", summary: "SUSE Bug 1143048 for CVE-2018-20856", url: "https://bugzilla.suse.com/1143048", }, { category: "external", summary: "SUSE Bug 1156331 for CVE-2018-20856", url: "https://bugzilla.suse.com/1156331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:15:07Z", details: "moderate", }, ], title: "CVE-2018-20856", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:15:07Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-5-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:15:07Z", details: "important", }, ], title: "CVE-2019-13272", }, ], }
suse-su-2019:2949-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12-SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described 'Microarchitectural Data Sampling' attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not\n enforce CAP_NET_RAW, which meant that unprivileged users could create a raw\n socket (bnc#1152782).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,\n which caused an i_size_read() infinite loop and denial of service on SMP\n systems (bnc#1151347).\n\n- CVE-2019-15902: A backporting issue was discovered that re-introduced the\n Spectre vulnerability it had aimed to eliminate. This occurred because the\n backport process depends on cherry picking specific commits, and because two\n (correctly ordered) code lines were swapped (bnc#1149376).\n\n- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused\n by a malicious USB device (bnc#1146519).\n\n- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused\n to cause denial of service (bnc#1148938).\n\n- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a\n process that wants to create a ptrace relationship, which allowed local users\n to obtain root access by leveraging certain scenarios with a parent-child\n process relationship, where a parent drops privileges and calls execve\n (potentially allowing control by an attacker). (bnc#1140671).\n\n- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's KVM\n hypervisor. An unprivileged host user or process with access to '/dev/kvm'\n device could use this flaw to crash the host kernel, resulting in a denial of\n service or potentially escalating privileges on the system (bnc#1151350).\n\n- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by\n crafted USB device traffic (bnc#1147122).\n\n- CVE-2017-18595: A double free in allocate_trace_buffer was fixed\n (bnc#1149555).\n\n- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost\n functionality that translates virtqueue buffers to IOVs. A privileged guest\n user able to pass descriptors with invalid length to the host could use this\n flaw to increase their privileges on the host (bnc#1150112).\n\n- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious\n USB device (bnc#1146361).\n\n- CVE-2019-15924: A a NULL pointer dereference has been fixed in the\n drivers/net/ethernet/intel/fm10k module (bnc#1149612).\n\n- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been\n fixed. This issue could lead to local escalation of privilege with System\n execution privileges needed. (bnc#1150025).\n\n- CVE-2019-15926: An out-of-bounds access was fixed in the\n drivers/net/wireless/ath/ath6kl module. (bnc#1149527).\n\n- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer\n module (bnc#1149522).\n\n- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm\n module that could cause denial of service (bnc#1148394).\n\n- CVE-2017-18379: An out-of-boundary access was fixed in the\n drivers/nvme/target module (bnc#1143187).\n\n- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by\n a malicious USB device (bnc#1146519 1146524).\n\n- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a\n malicious USB device (bnc#1146519 1146526).\n\n- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by\n a malicious USB device (bnc#1146519 1146529).\n\n- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi\n chip driver. That issue allowed local users to cause a denial of service\n (system crash) or possibly execute arbitrary code (bnc#1146512).\n\n- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed\n (bsc#1146512, bsc#1146514, bsc#1146516).\n\n- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver\n was fixed. Local users would have abused this issue to cause a denial of\n service (system crash) or possibly execute arbitrary code (bnc#1146516).\n\n- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket\n option, an attacker could control a pointer in kernel land and cause an\n inet_csk_listen_stop general protection fault, or potentially execute\n arbitrary code under certain circumstances. The issue can be triggered as\n root (e.g., inside a default LXC container or with the CAP_NET_ADMIN\n capability) or after namespace unsharing. (bnc#1145477)\n\n- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently\n low encryption key length and did not prevent an attacker from influencing\n the key length negotiation. This allowed practical brute-force attacks (aka\n 'KNOB') that could decrypt traffic and inject arbitrary ciphertext without\n the victim noticing (bnc#1137865).\n\n- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was\n fixed (bnc#1146378).\n\n- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe\n was fixed (bsc#1146378).\n\n- CVE-2019-15239: A incorrect patch to net/ipv4 was fixed. By adding to a write\n queue between disconnection and re-connection, a local attacker could trigger\n multiple use-after-free conditions. This could result in kernel crashes or\n potentially in privilege escalation. (bnc#1146589)\n\n- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver\n (bnc#1146391).\n\n- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc\n (bnc#1146584).\n\n- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/v4l2-core driver (bnc#1146519).\n\n- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB\n device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).\n\n- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed\n (bnc#1146519).\n\n- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device\n was fixed in the drivers/media/usb/siano driver (bnc#1146413).\n\n- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).\n\n- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver\n (bnc#1146285).\n\n- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver\n (bnc#1146163).\n\n- CVE-2019-0154: An unprotected read access to i915 registers has been fixed\n that could have been abused to facilitate a local denial-of-service attack.\n (bsc#1135966)\n\n- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the\n i915 module that allowed batch buffers from user mode to gain super user\n privileges. (bsc#1135967)\n\nThe following non-security bugs were fixed:\n\n- array_index_nospec: Sanitize speculative array (bsc#1155671)\n- bonding/802.3ad: fix link_failure_count tracking (bsc#1141013).\n- bonding/802.3ad: fix slave link initialization transition states (bsc#1141013).\n- bonding: correctly update link status during mii-commit phase (bsc#1141013).\n- bonding: fix active-backup transition (bsc#1141013).\n- bonding: make speed, duplex setting consistent with link state (bsc#1141013).\n- bonding: ratelimit failed speed/duplex update warning (bsc#1141013).\n- bonding: require speed/duplex only for 802.3ad, alb and tlb (bsc#1141013).\n- bonding: set default miimon value for non-arp modes if not set (bsc#1141013).\n- bonding: speed/duplex update at NETDEV_UP event (bsc#1141013).\n- cifs: fix panic in smb2_reconnect (bsc#1142458).\n- cifs: handle netapp error codes (bsc#1136261).\n- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154103)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: lapic: cap __delay at lapic_timer_advance_ns (bsc#1149083).\n- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: mmu: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).\n- kvm: mmu: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).\n- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).\n- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).\n- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).\n- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).\n- kvm: x86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).\n- kvm: x86: move nsec_to_cycles from x86.c to x86.h (bsc#1149083).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- kvm: x86: simplify ept_misconfig (bsc#1117665).\n- media: smsusb: better handle optional alignment (bsc#1146413).\n- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).\n- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 bsc#1150942 ltc#178925 ltc#181484).\n- powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840).\n- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).\n- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878) During the backport of 260f4aeddb48 ('scsi: scsi_transport_fc: return -EBUSY for deleted vport') an additional list_del() was introduced. The list entry will be freed in fc_vport_terminate(). Do not free it premature in fc_remove_host().\n- swiotlb: Add support for DMA_ATTR_SKIP_CPU_SYNC in Xen-swiotlb unmap path (bsc#1133140).\n- vmci: Release resource if the work is already queued (bsc#1051510).\n- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).\n", title: "Description of the patch", }, { category: "details", text: "HPE-Helion-OpenStack-8-2019-2949,SUSE-2019-2949,SUSE-OpenStack-Cloud-8-2019-2949,SUSE-OpenStack-Cloud-Crowbar-8-2019-2949,SUSE-SLE-HA-12-SP3-2019-2949,SUSE-SLE-SAP-12-SP3-2019-2949,SUSE-SLE-SERVER-12-SP3-2019-2949,SUSE-SLE-SERVER-12-SP3-BCL-2019-2949,SUSE-Storage-5-2019-2949", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2949-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:2949-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:2949-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1084878", url: "https://bugzilla.suse.com/1084878", }, { category: "self", summary: "SUSE Bug 1117665", url: "https://bugzilla.suse.com/1117665", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1133140", url: "https://bugzilla.suse.com/1133140", }, { category: "self", summary: "SUSE Bug 1135966", url: "https://bugzilla.suse.com/1135966", }, { category: "self", summary: "SUSE Bug 1135967", url: "https://bugzilla.suse.com/1135967", }, { category: "self", summary: "SUSE Bug 1136261", url: "https://bugzilla.suse.com/1136261", }, { category: "self", summary: "SUSE Bug 1137865", url: "https://bugzilla.suse.com/1137865", }, { category: "self", summary: "SUSE Bug 1139073", url: "https://bugzilla.suse.com/1139073", }, { category: "self", summary: "SUSE Bug 1140671", url: "https://bugzilla.suse.com/1140671", }, { category: "self", summary: "SUSE Bug 1141013", url: "https://bugzilla.suse.com/1141013", }, { category: "self", summary: "SUSE Bug 1141054", url: "https://bugzilla.suse.com/1141054", }, { category: "self", summary: "SUSE Bug 1142458", url: "https://bugzilla.suse.com/1142458", }, { category: "self", summary: "SUSE Bug 1143187", url: "https://bugzilla.suse.com/1143187", }, { category: "self", summary: "SUSE Bug 1144123", url: "https://bugzilla.suse.com/1144123", }, { category: "self", summary: "SUSE Bug 1144903", url: "https://bugzilla.suse.com/1144903", }, { category: "self", summary: "SUSE Bug 1145477", url: "https://bugzilla.suse.com/1145477", }, { category: "self", summary: "SUSE Bug 1146042", url: "https://bugzilla.suse.com/1146042", }, { category: "self", summary: "SUSE Bug 1146163", url: "https://bugzilla.suse.com/1146163", }, { category: "self", summary: "SUSE Bug 1146285", url: "https://bugzilla.suse.com/1146285", }, { category: "self", summary: "SUSE Bug 1146361", url: "https://bugzilla.suse.com/1146361", }, { category: "self", summary: "SUSE Bug 1146378", url: "https://bugzilla.suse.com/1146378", }, { category: "self", summary: "SUSE Bug 1146391", url: "https://bugzilla.suse.com/1146391", }, { category: "self", summary: "SUSE Bug 1146413", url: "https://bugzilla.suse.com/1146413", }, { category: "self", summary: "SUSE Bug 1146425", url: "https://bugzilla.suse.com/1146425", }, { category: "self", summary: "SUSE Bug 1146512", url: "https://bugzilla.suse.com/1146512", }, { category: "self", summary: "SUSE Bug 1146514", url: "https://bugzilla.suse.com/1146514", }, { category: "self", summary: "SUSE Bug 1146516", url: "https://bugzilla.suse.com/1146516", }, { category: "self", summary: "SUSE Bug 1146519", url: "https://bugzilla.suse.com/1146519", }, { category: "self", summary: "SUSE Bug 1146524", url: "https://bugzilla.suse.com/1146524", }, { category: "self", summary: "SUSE Bug 1146526", url: "https://bugzilla.suse.com/1146526", }, { category: "self", summary: "SUSE Bug 1146529", url: "https://bugzilla.suse.com/1146529", }, { category: "self", summary: "SUSE Bug 1146540", url: "https://bugzilla.suse.com/1146540", }, { category: "self", summary: "SUSE Bug 1146543", url: "https://bugzilla.suse.com/1146543", }, { category: "self", summary: "SUSE Bug 1146547", url: "https://bugzilla.suse.com/1146547", }, { category: "self", summary: "SUSE Bug 1146550", url: "https://bugzilla.suse.com/1146550", }, { category: "self", summary: "SUSE Bug 1146584", url: "https://bugzilla.suse.com/1146584", }, { category: "self", summary: "SUSE Bug 1146589", url: "https://bugzilla.suse.com/1146589", }, { category: "self", summary: "SUSE Bug 1147022", url: "https://bugzilla.suse.com/1147022", }, { category: "self", summary: "SUSE Bug 1147122", url: "https://bugzilla.suse.com/1147122", }, { category: "self", summary: "SUSE Bug 1148394", url: "https://bugzilla.suse.com/1148394", }, { category: "self", summary: "SUSE Bug 1148938", url: "https://bugzilla.suse.com/1148938", }, { category: "self", summary: "SUSE Bug 1149083", url: "https://bugzilla.suse.com/1149083", }, { category: "self", summary: "SUSE Bug 1149376", url: "https://bugzilla.suse.com/1149376", }, { category: "self", summary: "SUSE Bug 1149522", url: "https://bugzilla.suse.com/1149522", }, { category: "self", summary: "SUSE Bug 1149527", url: "https://bugzilla.suse.com/1149527", }, { category: "self", summary: "SUSE Bug 1149555", url: "https://bugzilla.suse.com/1149555", }, { category: "self", summary: "SUSE Bug 1149612", url: "https://bugzilla.suse.com/1149612", }, { category: "self", summary: "SUSE Bug 1150025", url: "https://bugzilla.suse.com/1150025", }, { category: "self", summary: "SUSE Bug 1150112", url: "https://bugzilla.suse.com/1150112", }, { category: "self", summary: "SUSE Bug 1150452", url: "https://bugzilla.suse.com/1150452", }, { category: "self", summary: "SUSE Bug 1150457", url: "https://bugzilla.suse.com/1150457", }, { category: "self", summary: "SUSE Bug 1150465", url: "https://bugzilla.suse.com/1150465", }, { category: "self", summary: "SUSE Bug 1150727", url: "https://bugzilla.suse.com/1150727", }, { category: "self", summary: "SUSE Bug 1150942", url: "https://bugzilla.suse.com/1150942", }, { category: "self", summary: "SUSE Bug 1151347", url: "https://bugzilla.suse.com/1151347", }, { category: "self", summary: "SUSE Bug 1151350", url: "https://bugzilla.suse.com/1151350", }, { category: "self", summary: "SUSE Bug 1152685", url: "https://bugzilla.suse.com/1152685", }, { category: "self", summary: "SUSE Bug 1152782", url: "https://bugzilla.suse.com/1152782", }, { category: "self", summary: "SUSE Bug 1152788", url: "https://bugzilla.suse.com/1152788", }, { category: "self", summary: "SUSE Bug 1153158", url: "https://bugzilla.suse.com/1153158", }, { category: "self", summary: "SUSE Bug 1153263", url: "https://bugzilla.suse.com/1153263", }, { category: "self", summary: "SUSE Bug 1154103", url: "https://bugzilla.suse.com/1154103", }, { category: "self", summary: "SUSE Bug 1154372", url: "https://bugzilla.suse.com/1154372", }, { category: "self", summary: "SUSE Bug 1155131", url: "https://bugzilla.suse.com/1155131", }, { category: "self", summary: "SUSE Bug 1155671", url: "https://bugzilla.suse.com/1155671", }, { category: "self", summary: "SUSE CVE CVE-2016-10906 page", url: "https://www.suse.com/security/cve/CVE-2016-10906/", }, { category: "self", summary: "SUSE CVE CVE-2017-18379 page", url: "https://www.suse.com/security/cve/CVE-2017-18379/", }, { category: "self", summary: "SUSE CVE CVE-2017-18509 page", url: "https://www.suse.com/security/cve/CVE-2017-18509/", }, { category: "self", summary: "SUSE CVE CVE-2017-18551 page", url: "https://www.suse.com/security/cve/CVE-2017-18551/", }, { category: "self", summary: "SUSE CVE CVE-2017-18595 page", url: "https://www.suse.com/security/cve/CVE-2017-18595/", }, { category: "self", summary: "SUSE CVE CVE-2018-12207 page", url: "https://www.suse.com/security/cve/CVE-2018-12207/", }, { category: "self", summary: "SUSE CVE CVE-2018-20976 page", url: "https://www.suse.com/security/cve/CVE-2018-20976/", }, { category: "self", summary: "SUSE CVE CVE-2019-0154 page", url: "https://www.suse.com/security/cve/CVE-2019-0154/", }, { category: "self", summary: "SUSE CVE CVE-2019-0155 page", url: "https://www.suse.com/security/cve/CVE-2019-0155/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-11135 page", url: "https://www.suse.com/security/cve/CVE-2019-11135/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-14814 page", url: "https://www.suse.com/security/cve/CVE-2019-14814/", }, { category: "self", summary: "SUSE CVE CVE-2019-14815 page", url: "https://www.suse.com/security/cve/CVE-2019-14815/", }, { category: "self", summary: "SUSE CVE CVE-2019-14816 page", url: "https://www.suse.com/security/cve/CVE-2019-14816/", }, { category: "self", summary: "SUSE CVE CVE-2019-14821 page", url: "https://www.suse.com/security/cve/CVE-2019-14821/", }, { category: "self", summary: "SUSE CVE CVE-2019-14835 page", url: "https://www.suse.com/security/cve/CVE-2019-14835/", }, { category: "self", summary: "SUSE CVE CVE-2019-15098 page", url: "https://www.suse.com/security/cve/CVE-2019-15098/", }, { category: "self", summary: "SUSE CVE CVE-2019-15211 page", url: "https://www.suse.com/security/cve/CVE-2019-15211/", }, { category: "self", summary: "SUSE CVE CVE-2019-15212 page", url: "https://www.suse.com/security/cve/CVE-2019-15212/", }, { category: "self", summary: "SUSE CVE CVE-2019-15214 page", url: "https://www.suse.com/security/cve/CVE-2019-15214/", }, { category: "self", summary: "SUSE CVE CVE-2019-15215 page", url: "https://www.suse.com/security/cve/CVE-2019-15215/", }, { category: "self", summary: "SUSE CVE CVE-2019-15216 page", url: "https://www.suse.com/security/cve/CVE-2019-15216/", }, { category: "self", summary: "SUSE CVE CVE-2019-15217 page", url: "https://www.suse.com/security/cve/CVE-2019-15217/", }, { category: "self", summary: "SUSE CVE CVE-2019-15218 page", url: "https://www.suse.com/security/cve/CVE-2019-15218/", }, { category: "self", summary: "SUSE CVE CVE-2019-15219 page", url: "https://www.suse.com/security/cve/CVE-2019-15219/", }, { category: "self", summary: "SUSE CVE CVE-2019-15220 page", url: "https://www.suse.com/security/cve/CVE-2019-15220/", }, { category: "self", summary: "SUSE CVE CVE-2019-15221 page", url: "https://www.suse.com/security/cve/CVE-2019-15221/", }, { category: "self", summary: "SUSE CVE CVE-2019-15239 page", url: "https://www.suse.com/security/cve/CVE-2019-15239/", }, { category: "self", summary: "SUSE CVE CVE-2019-15290 page", url: "https://www.suse.com/security/cve/CVE-2019-15290/", }, { category: "self", summary: "SUSE CVE CVE-2019-15291 page", url: "https://www.suse.com/security/cve/CVE-2019-15291/", }, { category: "self", summary: "SUSE CVE CVE-2019-15505 page", url: "https://www.suse.com/security/cve/CVE-2019-15505/", }, { category: "self", summary: "SUSE CVE CVE-2019-15666 page", url: "https://www.suse.com/security/cve/CVE-2019-15666/", }, { category: "self", summary: "SUSE CVE CVE-2019-15807 page", url: "https://www.suse.com/security/cve/CVE-2019-15807/", }, { category: "self", summary: "SUSE CVE CVE-2019-15902 page", url: "https://www.suse.com/security/cve/CVE-2019-15902/", }, { category: "self", summary: "SUSE CVE CVE-2019-15924 page", url: "https://www.suse.com/security/cve/CVE-2019-15924/", }, { category: "self", summary: "SUSE CVE CVE-2019-15926 page", url: "https://www.suse.com/security/cve/CVE-2019-15926/", }, { category: "self", summary: "SUSE CVE CVE-2019-15927 page", url: "https://www.suse.com/security/cve/CVE-2019-15927/", }, { category: "self", summary: "SUSE CVE CVE-2019-16232 page", url: "https://www.suse.com/security/cve/CVE-2019-16232/", }, { category: "self", summary: "SUSE CVE CVE-2019-16233 page", url: "https://www.suse.com/security/cve/CVE-2019-16233/", }, { category: "self", summary: "SUSE CVE CVE-2019-16234 page", url: "https://www.suse.com/security/cve/CVE-2019-16234/", }, { category: "self", summary: "SUSE CVE CVE-2019-16413 page", url: "https://www.suse.com/security/cve/CVE-2019-16413/", }, { category: "self", summary: "SUSE CVE CVE-2019-16995 page", url: "https://www.suse.com/security/cve/CVE-2019-16995/", }, { category: "self", summary: "SUSE CVE CVE-2019-17055 page", url: "https://www.suse.com/security/cve/CVE-2019-17055/", }, { category: "self", summary: "SUSE CVE CVE-2019-17056 page", url: "https://www.suse.com/security/cve/CVE-2019-17056/", }, { category: "self", summary: "SUSE CVE CVE-2019-17133 page", url: "https://www.suse.com/security/cve/CVE-2019-17133/", }, { category: "self", summary: "SUSE CVE CVE-2019-17666 page", url: "https://www.suse.com/security/cve/CVE-2019-17666/", }, { category: "self", summary: "SUSE CVE CVE-2019-9456 page", url: "https://www.suse.com/security/cve/CVE-2019-9456/", }, { category: "self", summary: "SUSE CVE CVE-2019-9506 page", url: "https://www.suse.com/security/cve/CVE-2019-9506/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-11-15T06:29:59Z", generator: { date: "2019-11-15T06:29:59Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:2949-1", initial_release_date: "2019-11-15T06:29:59Z", revision_history: [ { date: "2019-11-15T06:29:59Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.180-94.107.1.aarch64", product: { name: "cluster-md-kmp-default-4.4.180-94.107.1.aarch64", product_id: "cluster-md-kmp-default-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.180-94.107.1.aarch64", product: { name: "dlm-kmp-default-4.4.180-94.107.1.aarch64", product_id: "dlm-kmp-default-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.180-94.107.1.aarch64", product: { name: "gfs2-kmp-default-4.4.180-94.107.1.aarch64", product_id: "gfs2-kmp-default-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.4.180-94.107.1.aarch64", product: { name: "kernel-default-4.4.180-94.107.1.aarch64", product_id: "kernel-default-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.4.180-94.107.1.aarch64", product: { name: "kernel-default-base-4.4.180-94.107.1.aarch64", product_id: "kernel-default-base-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.180-94.107.1.aarch64", product: { name: "kernel-default-devel-4.4.180-94.107.1.aarch64", product_id: "kernel-default-devel-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.180-94.107.1.aarch64", product: { name: "kernel-default-extra-4.4.180-94.107.1.aarch64", product_id: "kernel-default-extra-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.180-94.107.1.aarch64", product: { name: "kernel-default-kgraft-4.4.180-94.107.1.aarch64", product_id: "kernel-default-kgraft-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.180-94.107.1.aarch64", product: { name: "kernel-obs-build-4.4.180-94.107.1.aarch64", product_id: "kernel-obs-build-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.180-94.107.1.aarch64", product: { name: "kernel-obs-qa-4.4.180-94.107.1.aarch64", product_id: "kernel-obs-qa-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.4.180-94.107.1.aarch64", product: { name: "kernel-syms-4.4.180-94.107.1.aarch64", product_id: "kernel-syms-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.180-94.107.1.aarch64", product: { name: "kernel-vanilla-4.4.180-94.107.1.aarch64", product_id: "kernel-vanilla-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.180-94.107.1.aarch64", product: { name: "kernel-vanilla-base-4.4.180-94.107.1.aarch64", product_id: "kernel-vanilla-base-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.180-94.107.1.aarch64", product: { name: "kernel-vanilla-devel-4.4.180-94.107.1.aarch64", product_id: "kernel-vanilla-devel-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.4.180-94.107.1.aarch64", product: { name: "kselftests-kmp-default-4.4.180-94.107.1.aarch64", product_id: "kselftests-kmp-default-4.4.180-94.107.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.180-94.107.1.aarch64", product: { name: "ocfs2-kmp-default-4.4.180-94.107.1.aarch64", product_id: "ocfs2-kmp-default-4.4.180-94.107.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.4.180-94.107.1.noarch", product: { name: "kernel-devel-4.4.180-94.107.1.noarch", product_id: "kernel-devel-4.4.180-94.107.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.4.180-94.107.1.noarch", product: { name: "kernel-macros-4.4.180-94.107.1.noarch", product_id: "kernel-macros-4.4.180-94.107.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.4.180-94.107.1.noarch", product: { name: "kernel-source-4.4.180-94.107.1.noarch", product_id: "kernel-source-4.4.180-94.107.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.4.180-94.107.1.noarch", product: { name: "kernel-docs-4.4.180-94.107.1.noarch", product_id: "kernel-docs-4.4.180-94.107.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.4.180-94.107.1.noarch", product: { name: "kernel-docs-html-4.4.180-94.107.1.noarch", product_id: "kernel-docs-html-4.4.180-94.107.1.noarch", }, }, { category: "product_version", name: "kernel-docs-pdf-4.4.180-94.107.1.noarch", product: { name: "kernel-docs-pdf-4.4.180-94.107.1.noarch", product_id: "kernel-docs-pdf-4.4.180-94.107.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.4.180-94.107.1.noarch", product: { name: "kernel-source-vanilla-4.4.180-94.107.1.noarch", product_id: "kernel-source-vanilla-4.4.180-94.107.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.4.180-94.107.1.ppc64le", product: { name: "cluster-md-kmp-debug-4.4.180-94.107.1.ppc64le", product_id: "cluster-md-kmp-debug-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", product: { name: "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", product_id: "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.180-94.107.1.ppc64le", product: { name: "dlm-kmp-debug-4.4.180-94.107.1.ppc64le", product_id: "dlm-kmp-debug-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.180-94.107.1.ppc64le", product: { name: "dlm-kmp-default-4.4.180-94.107.1.ppc64le", product_id: "dlm-kmp-default-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.180-94.107.1.ppc64le", product: { name: "gfs2-kmp-debug-4.4.180-94.107.1.ppc64le", product_id: "gfs2-kmp-debug-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.180-94.107.1.ppc64le", product: { name: "gfs2-kmp-default-4.4.180-94.107.1.ppc64le", product_id: "gfs2-kmp-default-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.4.180-94.107.1.ppc64le", product: { name: "kernel-debug-4.4.180-94.107.1.ppc64le", product_id: "kernel-debug-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.4.180-94.107.1.ppc64le", product: { name: "kernel-debug-base-4.4.180-94.107.1.ppc64le", product_id: "kernel-debug-base-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.180-94.107.1.ppc64le", product: { name: "kernel-debug-devel-4.4.180-94.107.1.ppc64le", product_id: "kernel-debug-devel-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.180-94.107.1.ppc64le", product: { name: "kernel-debug-extra-4.4.180-94.107.1.ppc64le", product_id: "kernel-debug-extra-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.180-94.107.1.ppc64le", product: { name: "kernel-debug-kgraft-4.4.180-94.107.1.ppc64le", product_id: "kernel-debug-kgraft-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.4.180-94.107.1.ppc64le", product: { name: "kernel-default-4.4.180-94.107.1.ppc64le", product_id: "kernel-default-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.4.180-94.107.1.ppc64le", product: { name: "kernel-default-base-4.4.180-94.107.1.ppc64le", product_id: "kernel-default-base-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.4.180-94.107.1.ppc64le", product: { name: "kernel-default-devel-4.4.180-94.107.1.ppc64le", product_id: "kernel-default-devel-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.4.180-94.107.1.ppc64le", product: { name: "kernel-default-extra-4.4.180-94.107.1.ppc64le", product_id: "kernel-default-extra-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.180-94.107.1.ppc64le", product: { name: "kernel-default-kgraft-4.4.180-94.107.1.ppc64le", product_id: "kernel-default-kgraft-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.4.180-94.107.1.ppc64le", product: { name: "kernel-obs-build-4.4.180-94.107.1.ppc64le", product_id: "kernel-obs-build-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.180-94.107.1.ppc64le", product: { name: "kernel-obs-qa-4.4.180-94.107.1.ppc64le", product_id: "kernel-obs-qa-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.4.180-94.107.1.ppc64le", product: { name: "kernel-syms-4.4.180-94.107.1.ppc64le", product_id: "kernel-syms-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.4.180-94.107.1.ppc64le", product: { name: "kernel-vanilla-4.4.180-94.107.1.ppc64le", product_id: "kernel-vanilla-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.180-94.107.1.ppc64le", product: { name: "kernel-vanilla-base-4.4.180-94.107.1.ppc64le", product_id: "kernel-vanilla-base-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.180-94.107.1.ppc64le", product: { name: "kernel-vanilla-devel-4.4.180-94.107.1.ppc64le", product_id: "kernel-vanilla-devel-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", product: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", product_id: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-debug-4.4.180-94.107.1.ppc64le", product: { name: "kselftests-kmp-debug-4.4.180-94.107.1.ppc64le", product_id: "kselftests-kmp-debug-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.4.180-94.107.1.ppc64le", product: { name: "kselftests-kmp-default-4.4.180-94.107.1.ppc64le", product_id: "kselftests-kmp-default-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.180-94.107.1.ppc64le", product: { name: "ocfs2-kmp-debug-4.4.180-94.107.1.ppc64le", product_id: "ocfs2-kmp-debug-4.4.180-94.107.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", product: { name: "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", product_id: "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.180-94.107.1.s390x", product: { name: "cluster-md-kmp-default-4.4.180-94.107.1.s390x", product_id: "cluster-md-kmp-default-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.180-94.107.1.s390x", product: { name: "dlm-kmp-default-4.4.180-94.107.1.s390x", product_id: "dlm-kmp-default-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.180-94.107.1.s390x", product: { name: "gfs2-kmp-default-4.4.180-94.107.1.s390x", product_id: "gfs2-kmp-default-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.4.180-94.107.1.s390x", product: { name: "kernel-default-4.4.180-94.107.1.s390x", product_id: "kernel-default-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.4.180-94.107.1.s390x", product: { name: "kernel-default-base-4.4.180-94.107.1.s390x", product_id: "kernel-default-base-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.4.180-94.107.1.s390x", product: { name: "kernel-default-devel-4.4.180-94.107.1.s390x", product_id: "kernel-default-devel-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.4.180-94.107.1.s390x", product: { name: "kernel-default-extra-4.4.180-94.107.1.s390x", product_id: "kernel-default-extra-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.180-94.107.1.s390x", product: { name: "kernel-default-kgraft-4.4.180-94.107.1.s390x", product_id: "kernel-default-kgraft-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.4.180-94.107.1.s390x", product: { name: "kernel-default-man-4.4.180-94.107.1.s390x", product_id: "kernel-default-man-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.4.180-94.107.1.s390x", product: { name: "kernel-obs-build-4.4.180-94.107.1.s390x", product_id: "kernel-obs-build-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.180-94.107.1.s390x", product: { name: "kernel-obs-qa-4.4.180-94.107.1.s390x", product_id: "kernel-obs-qa-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.4.180-94.107.1.s390x", product: { name: "kernel-syms-4.4.180-94.107.1.s390x", product_id: "kernel-syms-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.4.180-94.107.1.s390x", product: { name: "kernel-vanilla-4.4.180-94.107.1.s390x", product_id: "kernel-vanilla-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.180-94.107.1.s390x", product: { name: "kernel-vanilla-base-4.4.180-94.107.1.s390x", product_id: "kernel-vanilla-base-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.180-94.107.1.s390x", product: { name: "kernel-vanilla-devel-4.4.180-94.107.1.s390x", product_id: "kernel-vanilla-devel-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.4.180-94.107.1.s390x", product: { name: "kernel-zfcpdump-4.4.180-94.107.1.s390x", product_id: "kernel-zfcpdump-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.4.180-94.107.1.s390x", product: { name: "kselftests-kmp-default-4.4.180-94.107.1.s390x", product_id: "kselftests-kmp-default-4.4.180-94.107.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.180-94.107.1.s390x", product: { name: "ocfs2-kmp-default-4.4.180-94.107.1.s390x", product_id: "ocfs2-kmp-default-4.4.180-94.107.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-4.4.180-94.107.1.x86_64", product: { name: "kernel-default-4.4.180-94.107.1.x86_64", product_id: "kernel-default-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.4.180-94.107.1.x86_64", product: { name: "kernel-default-base-4.4.180-94.107.1.x86_64", product_id: "kernel-default-base-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.180-94.107.1.x86_64", product: { name: "kernel-default-devel-4.4.180-94.107.1.x86_64", product_id: "kernel-default-devel-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.180-94.107.1.x86_64", product: { name: "kernel-default-kgraft-4.4.180-94.107.1.x86_64", product_id: "kernel-default-kgraft-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.4.180-94.107.1.x86_64", product: { name: "kernel-syms-4.4.180-94.107.1.x86_64", product_id: "kernel-syms-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", product: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", product_id: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-debug-4.4.180-94.107.1.x86_64", product: { name: "cluster-md-kmp-debug-4.4.180-94.107.1.x86_64", product_id: "cluster-md-kmp-debug-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.180-94.107.1.x86_64", product: { name: "cluster-md-kmp-default-4.4.180-94.107.1.x86_64", product_id: "cluster-md-kmp-default-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.180-94.107.1.x86_64", product: { name: "dlm-kmp-debug-4.4.180-94.107.1.x86_64", product_id: "dlm-kmp-debug-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.180-94.107.1.x86_64", product: { name: "dlm-kmp-default-4.4.180-94.107.1.x86_64", product_id: "dlm-kmp-default-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.180-94.107.1.x86_64", product: { name: "gfs2-kmp-debug-4.4.180-94.107.1.x86_64", product_id: "gfs2-kmp-debug-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.180-94.107.1.x86_64", product: { name: "gfs2-kmp-default-4.4.180-94.107.1.x86_64", product_id: "gfs2-kmp-default-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.4.180-94.107.1.x86_64", product: { name: "kernel-debug-4.4.180-94.107.1.x86_64", product_id: "kernel-debug-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.4.180-94.107.1.x86_64", product: { name: "kernel-debug-base-4.4.180-94.107.1.x86_64", product_id: "kernel-debug-base-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.180-94.107.1.x86_64", product: { name: "kernel-debug-devel-4.4.180-94.107.1.x86_64", product_id: "kernel-debug-devel-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.180-94.107.1.x86_64", product: { name: "kernel-debug-extra-4.4.180-94.107.1.x86_64", product_id: "kernel-debug-extra-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.180-94.107.1.x86_64", product: { name: "kernel-debug-kgraft-4.4.180-94.107.1.x86_64", product_id: "kernel-debug-kgraft-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.180-94.107.1.x86_64", product: { name: "kernel-default-extra-4.4.180-94.107.1.x86_64", product_id: "kernel-default-extra-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.180-94.107.1.x86_64", product: { name: "kernel-obs-build-4.4.180-94.107.1.x86_64", product_id: "kernel-obs-build-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.180-94.107.1.x86_64", product: { name: "kernel-obs-qa-4.4.180-94.107.1.x86_64", product_id: "kernel-obs-qa-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.180-94.107.1.x86_64", product: { name: "kernel-vanilla-4.4.180-94.107.1.x86_64", product_id: "kernel-vanilla-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.180-94.107.1.x86_64", product: { name: "kernel-vanilla-base-4.4.180-94.107.1.x86_64", product_id: "kernel-vanilla-base-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.180-94.107.1.x86_64", product: { name: "kernel-vanilla-devel-4.4.180-94.107.1.x86_64", product_id: "kernel-vanilla-devel-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-debug-4.4.180-94.107.1.x86_64", product: { name: "kselftests-kmp-debug-4.4.180-94.107.1.x86_64", product_id: "kselftests-kmp-debug-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.4.180-94.107.1.x86_64", product: { name: "kselftests-kmp-default-4.4.180-94.107.1.x86_64", product_id: "kselftests-kmp-default-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.180-94.107.1.x86_64", product: { name: "ocfs2-kmp-debug-4.4.180-94.107.1.x86_64", product_id: "ocfs2-kmp-debug-4.4.180-94.107.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.180-94.107.1.x86_64", product: { name: "ocfs2-kmp-default-4.4.180-94.107.1.x86_64", product_id: "ocfs2-kmp-default-4.4.180-94.107.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "HPE Helion OpenStack 8", product: { name: "HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8", product_identification_helper: { cpe: "cpe:/o:suse:hpe-helion-openstack:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 8", product: { name: "SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 8", product: { name: "SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP3", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 5", product: { name: "SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5", product_identification_helper: { cpe: "cpe:/o:suse:ses:5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.107.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.107.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.107.1.noarch as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.107.1.noarch", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.107.1.noarch as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.107.1.noarch", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.107.1.noarch as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", }, product_reference: "kernel-source-4.4.180-94.107.1.noarch", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.107.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", }, product_reference: "kernel-source-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", }, product_reference: "kernel-source-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", }, product_reference: "cluster-md-kmp-default-4.4.180-94.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", }, product_reference: "dlm-kmp-default-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", }, product_reference: "dlm-kmp-default-4.4.180-94.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", }, product_reference: "dlm-kmp-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", }, product_reference: "gfs2-kmp-default-4.4.180-94.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", }, product_reference: "gfs2-kmp-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", }, product_reference: "ocfs2-kmp-default-4.4.180-94.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-default-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-default-base-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", }, product_reference: "kernel-source-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-syms-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", }, product_reference: "kernel-default-4.4.180-94.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-default-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", }, product_reference: "kernel-default-4.4.180-94.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", }, product_reference: "kernel-default-base-4.4.180-94.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-default-base-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", }, product_reference: "kernel-default-base-4.4.180-94.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", }, product_reference: "kernel-default-man-4.4.180-94.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", }, product_reference: "kernel-source-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", }, product_reference: "kernel-syms-4.4.180-94.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", }, product_reference: "kernel-syms-4.4.180-94.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", }, product_reference: "kernel-syms-4.4.180-94.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", }, product_reference: "kernel-source-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", }, product_reference: "kernel-default-4.4.180-94.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", }, product_reference: "kernel-default-base-4.4.180-94.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.107.1.noarch as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", }, product_reference: "kernel-source-4.4.180-94.107.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", }, product_reference: "kernel-syms-4.4.180-94.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10906", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10906", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10906", url: "https://www.suse.com/security/cve/CVE-2016-10906", }, { category: "external", summary: "SUSE Bug 1146584 for CVE-2016-10906", url: "https://bugzilla.suse.com/1146584", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2016-10906", }, { cve: "CVE-2017-18379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18379", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.14, an out of boundary access happened in drivers/nvme/target/fc.c.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18379", url: "https://www.suse.com/security/cve/CVE-2017-18379", }, { category: "external", summary: "SUSE Bug 1143187 for CVE-2017-18379", url: "https://bugzilla.suse.com/1143187", }, { category: "external", summary: "SUSE Bug 1145604 for CVE-2017-18379", url: "https://bugzilla.suse.com/1145604", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2017-18379", }, { cve: "CVE-2017-18509", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18509", }, ], notes: [ { category: "general", text: "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18509", url: "https://www.suse.com/security/cve/CVE-2017-18509", }, { category: "external", summary: "SUSE Bug 1145477 for CVE-2017-18509", url: "https://bugzilla.suse.com/1145477", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2017-18509", }, { cve: "CVE-2017-18551", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18551", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18551", url: "https://www.suse.com/security/cve/CVE-2017-18551", }, { category: "external", summary: "SUSE Bug 1146163 for CVE-2017-18551", url: "https://bugzilla.suse.com/1146163", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2017-18551", }, { cve: "CVE-2017-18595", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18595", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18595", url: "https://www.suse.com/security/cve/CVE-2017-18595", }, { category: "external", summary: "SUSE Bug 1149555 for CVE-2017-18595", url: "https://bugzilla.suse.com/1149555", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2017-18595", }, { cve: "CVE-2018-12207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12207", }, ], notes: [ { category: "general", text: "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12207", url: "https://www.suse.com/security/cve/CVE-2018-12207", }, { category: "external", summary: "SUSE Bug 1117665 for CVE-2018-12207", url: "https://bugzilla.suse.com/1117665", }, { category: "external", summary: "SUSE Bug 1139073 for CVE-2018-12207", url: "https://bugzilla.suse.com/1139073", }, { category: "external", summary: "SUSE Bug 1152505 for CVE-2018-12207", url: "https://bugzilla.suse.com/1152505", }, { category: "external", summary: "SUSE Bug 1155812 for CVE-2018-12207", url: "https://bugzilla.suse.com/1155812", }, { category: "external", summary: "SUSE Bug 1155817 for CVE-2018-12207", url: "https://bugzilla.suse.com/1155817", }, { category: "external", summary: "SUSE Bug 1155945 for CVE-2018-12207", url: "https://bugzilla.suse.com/1155945", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-12207", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-12207", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2018-12207", }, { cve: "CVE-2018-20976", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20976", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20976", url: "https://www.suse.com/security/cve/CVE-2018-20976", }, { category: "external", summary: "SUSE Bug 1146285 for CVE-2018-20976", url: "https://bugzilla.suse.com/1146285", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2018-20976", }, { cve: "CVE-2019-0154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0154", }, ], notes: [ { category: "general", text: "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0154", url: "https://www.suse.com/security/cve/CVE-2019-0154", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0154", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2019-0154", url: "https://bugzilla.suse.com/1181720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-0154", }, { cve: "CVE-2019-0155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0155", }, ], notes: [ { category: "general", text: "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0155", url: "https://www.suse.com/security/cve/CVE-2019-0155", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1135967 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135967", }, { category: "external", summary: "SUSE Bug 1173663 for CVE-2019-0155", url: "https://bugzilla.suse.com/1173663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-0155", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-11135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11135", }, ], notes: [ { category: "general", text: "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11135", url: "https://www.suse.com/security/cve/CVE-2019-11135", }, { category: "external", summary: "SUSE Bug 1139073 for CVE-2019-11135", url: "https://bugzilla.suse.com/1139073", }, { category: "external", summary: "SUSE Bug 1152497 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152497", }, { category: "external", summary: "SUSE Bug 1152505 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152505", }, { category: "external", summary: "SUSE Bug 1152506 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152506", }, { category: "external", summary: "SUSE Bug 1160120 for CVE-2019-11135", url: "https://bugzilla.suse.com/1160120", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2019-11135", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-11135", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-14814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14814", }, ], notes: [ { category: "general", text: "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14814", url: "https://www.suse.com/security/cve/CVE-2019-14814", }, { category: "external", summary: "SUSE Bug 1146512 for CVE-2019-14814", url: "https://bugzilla.suse.com/1146512", }, { category: "external", summary: "SUSE Bug 1173664 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173664", }, { category: "external", summary: "SUSE Bug 1173665 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-14814", }, { cve: "CVE-2019-14815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14815", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14815", url: "https://www.suse.com/security/cve/CVE-2019-14815", }, { category: "external", summary: "SUSE Bug 1146514 for CVE-2019-14815", url: "https://bugzilla.suse.com/1146514", }, { category: "external", summary: "SUSE Bug 1173665 for CVE-2019-14815", url: "https://bugzilla.suse.com/1173665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-14815", }, { cve: "CVE-2019-14816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14816", }, ], notes: [ { category: "general", text: "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14816", url: "https://www.suse.com/security/cve/CVE-2019-14816", }, { category: "external", summary: "SUSE Bug 1146516 for CVE-2019-14816", url: "https://bugzilla.suse.com/1146516", }, { category: "external", summary: "SUSE Bug 1173666 for CVE-2019-14816", url: "https://bugzilla.suse.com/1173666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-14816", }, { cve: "CVE-2019-14821", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14821", }, ], notes: [ { category: "general", text: "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14821", url: "https://www.suse.com/security/cve/CVE-2019-14821", }, { category: "external", summary: "SUSE Bug 1151350 for CVE-2019-14821", url: "https://bugzilla.suse.com/1151350", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2019-14821", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-14821", }, { cve: "CVE-2019-14835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14835", }, ], notes: [ { category: "general", text: "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14835", url: "https://www.suse.com/security/cve/CVE-2019-14835", }, { category: "external", summary: "SUSE Bug 1150112 for CVE-2019-14835", url: "https://bugzilla.suse.com/1150112", }, { category: "external", summary: "SUSE Bug 1151021 for CVE-2019-14835", url: "https://bugzilla.suse.com/1151021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-14835", }, { cve: "CVE-2019-15098", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15098", }, ], notes: [ { category: "general", text: "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15098", url: "https://www.suse.com/security/cve/CVE-2019-15098", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146543", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15098", }, { cve: "CVE-2019-15211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15211", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15211", url: "https://www.suse.com/security/cve/CVE-2019-15211", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15211", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15211", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15211", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15211", }, { cve: "CVE-2019-15212", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15212", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15212", url: "https://www.suse.com/security/cve/CVE-2019-15212", }, { category: "external", summary: "SUSE Bug 1146391 for CVE-2019-15212", url: "https://bugzilla.suse.com/1146391", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15212", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15212", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15212", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15212", }, { cve: "CVE-2019-15214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15214", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15214", url: "https://www.suse.com/security/cve/CVE-2019-15214", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15214", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146550 for CVE-2019-15214", url: "https://bugzilla.suse.com/1146550", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15214", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15214", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "low", }, ], title: "CVE-2019-15214", }, { cve: "CVE-2019-15215", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15215", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15215", url: "https://www.suse.com/security/cve/CVE-2019-15215", }, { category: "external", summary: "SUSE Bug 1146425 for CVE-2019-15215", url: "https://bugzilla.suse.com/1146425", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15215", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15215", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15215", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15215", }, { cve: "CVE-2019-15216", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15216", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15216", url: "https://www.suse.com/security/cve/CVE-2019-15216", }, { category: "external", summary: "SUSE Bug 1146361 for CVE-2019-15216", url: "https://bugzilla.suse.com/1146361", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15216", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15216", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15216", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15216", }, { cve: "CVE-2019-15217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15217", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15217", url: "https://www.suse.com/security/cve/CVE-2019-15217", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15217", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146547 for CVE-2019-15217", url: "https://bugzilla.suse.com/1146547", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15217", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15217", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15217", }, { cve: "CVE-2019-15218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15218", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15218", url: "https://www.suse.com/security/cve/CVE-2019-15218", }, { category: "external", summary: "SUSE Bug 1146413 for CVE-2019-15218", url: "https://bugzilla.suse.com/1146413", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15218", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15218", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15218", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15218", }, { cve: "CVE-2019-15219", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15219", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15219", url: "https://www.suse.com/security/cve/CVE-2019-15219", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15219", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146524 for CVE-2019-15219", url: "https://bugzilla.suse.com/1146524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15219", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15219", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15219", }, { cve: "CVE-2019-15220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15220", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15220", url: "https://www.suse.com/security/cve/CVE-2019-15220", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15220", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146526 for CVE-2019-15220", url: "https://bugzilla.suse.com/1146526", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15220", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15220", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15220", }, { cve: "CVE-2019-15221", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15221", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15221", url: "https://www.suse.com/security/cve/CVE-2019-15221", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15221", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146529 for CVE-2019-15221", url: "https://bugzilla.suse.com/1146529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15221", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15221", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15221", }, { cve: "CVE-2019-15239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15239", }, ], notes: [ { category: "general", text: "In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15239", url: "https://www.suse.com/security/cve/CVE-2019-15239", }, { category: "external", summary: "SUSE Bug 1146589 for CVE-2019-15239", url: "https://bugzilla.suse.com/1146589", }, { category: "external", summary: "SUSE Bug 1156317 for CVE-2019-15239", url: "https://bugzilla.suse.com/1156317", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-15239", }, { cve: "CVE-2019-15290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15290", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15290", url: "https://www.suse.com/security/cve/CVE-2019-15290", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146543", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15290", }, { cve: "CVE-2019-15291", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15291", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15291", url: "https://www.suse.com/security/cve/CVE-2019-15291", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15291", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146540 for CVE-2019-15291", url: "https://bugzilla.suse.com/1146540", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15291", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15291", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15291", }, { cve: "CVE-2019-15505", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15505", }, ], notes: [ { category: "general", text: "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15505", url: "https://www.suse.com/security/cve/CVE-2019-15505", }, { category: "external", summary: "SUSE Bug 1147122 for CVE-2019-15505", url: "https://bugzilla.suse.com/1147122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15505", }, { cve: "CVE-2019-15666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15666", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15666", url: "https://www.suse.com/security/cve/CVE-2019-15666", }, { category: "external", summary: "SUSE Bug 1148394 for CVE-2019-15666", url: "https://bugzilla.suse.com/1148394", }, { category: "external", summary: "SUSE Bug 1172140 for CVE-2019-15666", url: "https://bugzilla.suse.com/1172140", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-15666", }, { cve: "CVE-2019-15807", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15807", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15807", url: "https://www.suse.com/security/cve/CVE-2019-15807", }, { category: "external", summary: "SUSE Bug 1148938 for CVE-2019-15807", url: "https://bugzilla.suse.com/1148938", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15807", }, { cve: "CVE-2019-15902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15902", }, ], notes: [ { category: "general", text: "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15902", url: "https://www.suse.com/security/cve/CVE-2019-15902", }, { category: "external", summary: "SUSE Bug 1149376 for CVE-2019-15902", url: "https://bugzilla.suse.com/1149376", }, { category: "external", summary: "SUSE Bug 1155131 for CVE-2019-15902", url: "https://bugzilla.suse.com/1155131", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15902", }, { cve: "CVE-2019-15924", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15924", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15924", url: "https://www.suse.com/security/cve/CVE-2019-15924", }, { category: "external", summary: "SUSE Bug 1149612 for CVE-2019-15924", url: "https://bugzilla.suse.com/1149612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "low", }, ], title: "CVE-2019-15924", }, { cve: "CVE-2019-15926", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15926", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15926", url: "https://www.suse.com/security/cve/CVE-2019-15926", }, { category: "external", summary: "SUSE Bug 1149527 for CVE-2019-15926", url: "https://bugzilla.suse.com/1149527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15926", }, { cve: "CVE-2019-15927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15927", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15927", url: "https://www.suse.com/security/cve/CVE-2019-15927", }, { category: "external", summary: "SUSE Bug 1149522 for CVE-2019-15927", url: "https://bugzilla.suse.com/1149522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-15927", }, { cve: "CVE-2019-16232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16232", }, ], notes: [ { category: "general", text: "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16232", url: "https://www.suse.com/security/cve/CVE-2019-16232", }, { category: "external", summary: "SUSE Bug 1150465 for CVE-2019-16232", url: "https://bugzilla.suse.com/1150465", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "low", }, ], title: "CVE-2019-16232", }, { cve: "CVE-2019-16233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16233", }, ], notes: [ { category: "general", text: "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16233", url: "https://www.suse.com/security/cve/CVE-2019-16233", }, { category: "external", summary: "SUSE Bug 1150457 for CVE-2019-16233", url: "https://bugzilla.suse.com/1150457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "low", }, ], title: "CVE-2019-16233", }, { cve: "CVE-2019-16234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16234", }, ], notes: [ { category: "general", text: "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16234", url: "https://www.suse.com/security/cve/CVE-2019-16234", }, { category: "external", summary: "SUSE Bug 1150452 for CVE-2019-16234", url: "https://bugzilla.suse.com/1150452", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "low", }, ], title: "CVE-2019-16234", }, { cve: "CVE-2019-16413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16413", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16413", url: "https://www.suse.com/security/cve/CVE-2019-16413", }, { category: "external", summary: "SUSE Bug 1151347 for CVE-2019-16413", url: "https://bugzilla.suse.com/1151347", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-16413", }, { cve: "CVE-2019-16995", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16995", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16995", url: "https://www.suse.com/security/cve/CVE-2019-16995", }, { category: "external", summary: "SUSE Bug 1152685 for CVE-2019-16995", url: "https://bugzilla.suse.com/1152685", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-16995", }, { cve: "CVE-2019-17055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17055", }, ], notes: [ { category: "general", text: "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17055", url: "https://www.suse.com/security/cve/CVE-2019-17055", }, { category: "external", summary: "SUSE Bug 1152782 for CVE-2019-17055", url: "https://bugzilla.suse.com/1152782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "low", }, ], title: "CVE-2019-17055", }, { cve: "CVE-2019-17056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17056", }, ], notes: [ { category: "general", text: "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17056", url: "https://www.suse.com/security/cve/CVE-2019-17056", }, { category: "external", summary: "SUSE Bug 1152788 for CVE-2019-17056", url: "https://bugzilla.suse.com/1152788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-17056", }, { cve: "CVE-2019-17133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17133", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17133", url: "https://www.suse.com/security/cve/CVE-2019-17133", }, { category: "external", summary: "SUSE Bug 1153158 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153158", }, { category: "external", summary: "SUSE Bug 1153161 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "important", }, ], title: "CVE-2019-17133", }, { cve: "CVE-2019-17666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17666", }, ], notes: [ { category: "general", text: "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17666", url: "https://www.suse.com/security/cve/CVE-2019-17666", }, { category: "external", summary: "SUSE Bug 1154372 for CVE-2019-17666", url: "https://bugzilla.suse.com/1154372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-17666", }, { cve: "CVE-2019-9456", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9456", }, ], notes: [ { category: "general", text: "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9456", url: "https://www.suse.com/security/cve/CVE-2019-9456", }, { category: "external", summary: "SUSE Bug 1150025 for CVE-2019-9456", url: "https://bugzilla.suse.com/1150025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-9456", }, { cve: "CVE-2019-9506", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9506", }, ], notes: [ { category: "general", text: "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9506", url: "https://www.suse.com/security/cve/CVE-2019-9506", }, { category: "external", summary: "SUSE Bug 1137865 for CVE-2019-9506", url: "https://bugzilla.suse.com/1137865", }, { category: "external", summary: "SUSE Bug 1146042 for CVE-2019-9506", url: "https://bugzilla.suse.com/1146042", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-15T06:29:59Z", details: "moderate", }, ], title: "CVE-2019-9506", }, ], }
suse-su-2019:3263-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.4.121-92_120 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n\nThe following bugs were fixed:\n\n- Fixed boot up hang revealed by int3 self test (bsc#1157770).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3263,SUSE-SLE-SAP-12-SP2-2019-3263,SUSE-SLE-SERVER-12-SP2-2019-3263", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3263-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3263-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193263-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3263-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006246.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1157770", url: "https://bugzilla.suse.com/1157770", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, ], title: "Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)", tracking: { current_release_date: "2019-12-11T10:15:45Z", generator: { date: "2019-12-11T10:15:45Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3263-1", initial_release_date: "2019-12-11T10:15:45Z", revision_history: [ { date: "2019-12-11T10:15:45Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", product: { name: "kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", product_id: "kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", product: { name: "kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", product_id: "kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:15:45Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-4-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-11T10:15:45Z", details: "important", }, ], title: "CVE-2019-13272", }, ], }
suse-su-2019:3224-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP4)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 4.12.14-95_13 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).\n- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging\n certain scenarios with a parent-child process relationship (bsc#1156321).\n- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3224,SUSE-SLE-Live-Patching-12-SP4-2019-3224", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3224-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3224-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193224-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3224-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1156321", url: "https://bugzilla.suse.com/1156321", }, { category: "self", summary: "SUSE Bug 1156334", url: "https://bugzilla.suse.com/1156334", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-13272 page", url: "https://www.suse.com/security/cve/CVE-2019-13272/", }, { category: "self", summary: "SUSE CVE CVE-2019-15917 page", url: "https://www.suse.com/security/cve/CVE-2019-15917/", }, ], title: "Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP4)", tracking: { current_release_date: "2019-12-10T09:12:38Z", generator: { date: "2019-12-10T09:12:38Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3224-1", initial_release_date: "2019-12-10T09:12:38Z", revision_history: [ { date: "2019-12-10T09:12:38Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", product: { name: "kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", product_id: "kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", product: { name: "kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", product_id: "kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:12:38Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-13272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-13272", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-13272", url: "https://www.suse.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "SUSE Bug 1140671 for CVE-2019-13272", url: "https://bugzilla.suse.com/1140671", }, { category: "external", summary: "SUSE Bug 1156321 for CVE-2019-13272", url: "https://bugzilla.suse.com/1156321", }, { category: "external", summary: "SUSE Bug 1198122 for CVE-2019-13272", url: "https://bugzilla.suse.com/1198122", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:12:38Z", details: "important", }, ], title: "CVE-2019-13272", }, { cve: "CVE-2019-15917", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15917", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15917", url: "https://www.suse.com/security/cve/CVE-2019-15917", }, { category: "external", summary: "SUSE Bug 1149539 for CVE-2019-15917", url: "https://bugzilla.suse.com/1149539", }, { category: "external", summary: "SUSE Bug 1156334 for CVE-2019-15917", url: "https://bugzilla.suse.com/1156334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-6-2.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-10T09:12:38Z", details: "moderate", }, ], title: "CVE-2019-15917", }, ], }
ghsa-87j5-gppq-mq6h
Vulnerability from github
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.
{ affected: [], aliases: [ "CVE-2019-13272", ], database_specific: { cwe_ids: [ "CWE-269", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2019-07-17T13:15:00Z", severity: "HIGH", }, details: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.", id: "GHSA-87j5-gppq-mq6h", modified: "2024-07-24T18:31:14Z", published: "2022-05-24T16:50:31Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { type: "WEB", url: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { type: "WEB", url: "https://www.debian.org/security/2019/dsa-4484", }, { type: "WEB", url: "https://usn.ubuntu.com/4118-1", }, { type: "WEB", url: "https://usn.ubuntu.com/4117-1", }, { type: "WEB", url: "https://usn.ubuntu.com/4095-1", }, { type: "WEB", url: "https://usn.ubuntu.com/4094-1", }, { type: "WEB", url: "https://usn.ubuntu.com/4093-1", }, { type: "WEB", url: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS", }, { type: "WEB", url: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS", }, { type: "WEB", url: "https://support.f5.com/csp/article/K91025336", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20190806-0001", }, { type: "WEB", url: "https://seclists.org/bugtraq/2019/Jul/33", }, { type: "WEB", url: "https://seclists.org/bugtraq/2019/Jul/30", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html", }, { type: "WEB", url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { type: "WEB", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", }, { type: "WEB", url: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { type: "WEB", url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { type: "WEB", url: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
RHSA-2019:2405
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2405", url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/4329821", url: "https://access.redhat.com/articles/4329821", }, { category: "external", summary: "1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2405.json", }, ], title: "Red Hat Security Advisory: kernel-rt security update", tracking: { current_release_date: "2025-02-06T13:59:26+00:00", generator: { date: "2025-02-06T13:59:26+00:00", engine: { name: "Red Hat SDEngine", version: "4.3.0", }, }, id: "RHSA-2019:2405", initial_release_date: "2019-08-07T12:58:31+00:00", revision_history: [ { date: "2019-08-07T12:58:31+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-07T12:58:31+00:00", number: "2", summary: "Last updated version", }, { date: "2025-02-06T13:59:26+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Real Time for NFV (v. 8)", product: { name: "Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::nfv", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Real Time (v. 8)", product: { name: "Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::realtime", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-modules@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-core@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-devel@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", product: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", product_id: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.2.rt9.154.el8_0?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2019-1125", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2019-06-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1724389", }, ], notes: [ { category: "description", text: "A Spectre gadget was found in the Linux kernel's implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", title: "Vulnerability description", }, { category: "summary", text: "kernel: hw: Spectre SWAPGS gadget vulnerability", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-1125", }, { category: "external", summary: "RHBZ#1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-1125", url: "https://www.cve.org/CVERecord?id=CVE-2019-1125", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", }, ], release_date: "2019-08-06T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T12:58:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { category: "workaround", details: "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "kernel: hw: Spectre SWAPGS gadget vulnerability", }, { cve: "CVE-2019-13272", cwe: { id: "CWE-271", name: "Privilege Dropping / Lowering Errors", }, discovery_date: "2019-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1730895", }, ], notes: [ { category: "description", text: "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "RHBZ#1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-13272", url: "https://www.cve.org/CVERecord?id=CVE-2019-13272", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-07-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T12:58:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { category: "workaround", details: "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-12-10T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", }, ], }
rhsa-2019_2809
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974)\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [kernel-alt]: BUG: unable to handle kernel NULL pointer IP: crypto_remove_spawns+0x118/0x2e0 (BZ#1536967)\n\n* [HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages (BZ#1610534)\n\n* RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1673613)\n\n* RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in FIPS mode (BZ#1673979)\n\n* RHEL-Alt-7.6 - System crashed after oom - During ICP deployment (BZ#1710304)\n\n* kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127)\n\n* RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3 cores in quad and misses last core. (CORAL) (BZ#1717836)\n\n* RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN (BZ#1717906)\n\n* fragmented packets timing out (BZ#1729066)\n\n* Backport TCP follow-up for small buffers (BZ#1733617)\n\nEnhancement(s):\n\n* RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading nest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2809", url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1664110", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1664110", }, { category: "external", summary: "1671913", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1671913", }, { category: "external", summary: "1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2809.json", }, ], title: "Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-15T08:26:15+00:00", generator: { date: "2024-11-15T08:26:15+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2809", initial_release_date: "2019-09-20T12:04:26+00:00", revision_history: [ { date: "2019-09-20T12:04:26+00:00", number: "1", summary: "Initial version", }, { date: "2019-09-20T12:04:26+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T08:26:15+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "perf-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "perf-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", product: { name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", product_id: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.12.1.el7a?arch=noarch", }, }, }, { category: "product_version", name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", product: { name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", product_id: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-doc@4.14.0-115.12.1.el7a?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-alt-0:4.14.0-115.12.1.el7a.src", product: { name: "kernel-alt-0:4.14.0-115.12.1.el7a.src", product_id: "kernel-alt-0:4.14.0-115.12.1.el7a.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-alt@4.14.0-115.12.1.el7a?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.12.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.12.1.el7a.src", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.12.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.12.1.el7a.src", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, ], }, vulnerabilities: [ { cve: "CVE-2019-5489", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2019-01-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1664110", }, ], notes: [ { category: "description", text: "A new software page cache side channel attack scenario was discovered in operating systems that implement the very common 'page cache' caching mechanism. A malicious user/process could use 'in memory' page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.", title: "Vulnerability description", }, { category: "summary", text: "Kernel: page cache side channel attacks", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-5489", }, { category: "external", summary: "RHBZ#1664110", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1664110", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-5489", url: "https://www.cve.org/CVERecord?id=CVE-2019-5489", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-5489", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-5489", }, ], release_date: "2019-01-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-09-20T12:04:26+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2809", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "Kernel: page cache side channel attacks", }, { acknowledgments: [ { names: [ "Jann Horn", ], organization: "Google", }, ], cve: "CVE-2019-6974", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2019-01-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1671913", }, ], notes: [ { category: "description", text: "A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor implements its device control API. While creating a device via kvm_ioctl_create_device(), the device holds a reference to a VM object, later this reference is transferred to the caller's file descriptor table. If such file descriptor was to be closed, reference count to the VM object could become zero, potentially leading to a use-after-free issue. A user/process could use this flaw to crash the guest VM resulting in a denial of service issue or, potentially, gain privileged access to a system.", title: "Vulnerability description", }, { category: "summary", text: "Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()", title: "Vulnerability summary", }, { category: "other", text: "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-6974", }, { category: "external", summary: "RHBZ#1671913", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1671913", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-6974", url: "https://www.cve.org/CVERecord?id=CVE-2019-6974", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-6974", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-6974", }, ], release_date: "2019-02-07T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-09-20T12:04:26+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2809", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()", }, { cve: "CVE-2019-13272", cwe: { id: "CWE-271", name: "Privilege Dropping / Lowering Errors", }, discovery_date: "2019-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1730895", }, ], notes: [ { category: "description", text: "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "RHBZ#1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-13272", url: "https://www.cve.org/CVERecord?id=CVE-2019-13272", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-07-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-09-20T12:04:26+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { category: "workaround", details: "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], threats: [ { category: "exploit_status", date: "2021-12-10T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", }, ], }
RHSA-2019:2809
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974)\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [kernel-alt]: BUG: unable to handle kernel NULL pointer IP: crypto_remove_spawns+0x118/0x2e0 (BZ#1536967)\n\n* [HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages (BZ#1610534)\n\n* RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1673613)\n\n* RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in FIPS mode (BZ#1673979)\n\n* RHEL-Alt-7.6 - System crashed after oom - During ICP deployment (BZ#1710304)\n\n* kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127)\n\n* RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3 cores in quad and misses last core. (CORAL) (BZ#1717836)\n\n* RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN (BZ#1717906)\n\n* fragmented packets timing out (BZ#1729066)\n\n* Backport TCP follow-up for small buffers (BZ#1733617)\n\nEnhancement(s):\n\n* RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading nest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2809", url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1664110", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1664110", }, { category: "external", summary: "1671913", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1671913", }, { category: "external", summary: "1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2809.json", }, ], title: "Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-15T08:26:15+00:00", generator: { date: "2024-11-15T08:26:15+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2809", initial_release_date: "2019-09-20T12:04:26+00:00", revision_history: [ { date: "2019-09-20T12:04:26+00:00", number: "1", summary: "Initial version", }, { date: "2019-09-20T12:04:26+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T08:26:15+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "perf-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "perf-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", product: { name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", product_id: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.12.1.el7a?arch=noarch", }, }, }, { category: "product_version", name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", product: { name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", product_id: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-doc@4.14.0-115.12.1.el7a?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-alt-0:4.14.0-115.12.1.el7a.src", product: { name: "kernel-alt-0:4.14.0-115.12.1.el7a.src", product_id: "kernel-alt-0:4.14.0-115.12.1.el7a.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-alt@4.14.0-115.12.1.el7a?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.12.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.12.1.el7a.src", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.12.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.12.1.el7a.src", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, ], }, vulnerabilities: [ { cve: "CVE-2019-5489", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2019-01-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1664110", }, ], notes: [ { category: "description", text: "A new software page cache side channel attack scenario was discovered in operating systems that implement the very common 'page cache' caching mechanism. A malicious user/process could use 'in memory' page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.", title: "Vulnerability description", }, { category: "summary", text: "Kernel: page cache side channel attacks", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-5489", }, { category: "external", summary: "RHBZ#1664110", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1664110", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-5489", url: "https://www.cve.org/CVERecord?id=CVE-2019-5489", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-5489", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-5489", }, ], release_date: "2019-01-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-09-20T12:04:26+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2809", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "Kernel: page cache side channel attacks", }, { acknowledgments: [ { names: [ "Jann Horn", ], organization: "Google", }, ], cve: "CVE-2019-6974", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2019-01-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1671913", }, ], notes: [ { category: "description", text: "A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor implements its device control API. While creating a device via kvm_ioctl_create_device(), the device holds a reference to a VM object, later this reference is transferred to the caller's file descriptor table. If such file descriptor was to be closed, reference count to the VM object could become zero, potentially leading to a use-after-free issue. A user/process could use this flaw to crash the guest VM resulting in a denial of service issue or, potentially, gain privileged access to a system.", title: "Vulnerability description", }, { category: "summary", text: "Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()", title: "Vulnerability summary", }, { category: "other", text: "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-6974", }, { category: "external", summary: "RHBZ#1671913", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1671913", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-6974", url: "https://www.cve.org/CVERecord?id=CVE-2019-6974", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-6974", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-6974", }, ], release_date: "2019-02-07T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-09-20T12:04:26+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2809", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()", }, { cve: "CVE-2019-13272", cwe: { id: "CWE-271", name: "Privilege Dropping / Lowering Errors", }, discovery_date: "2019-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1730895", }, ], notes: [ { category: "description", text: "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "RHBZ#1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-13272", url: "https://www.cve.org/CVERecord?id=CVE-2019-13272", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-07-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-09-20T12:04:26+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { category: "workaround", details: "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], threats: [ { category: "exploit_status", date: "2021-12-10T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", }, ], }
rhsa-2019_2411
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2411", url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/4329821", url: "https://access.redhat.com/articles/4329821", }, { category: "external", summary: "1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2411.json", }, ], title: "Red Hat Security Advisory: kernel security update", tracking: { current_release_date: "2024-11-15T03:13:16+00:00", generator: { date: "2024-11-15T03:13:16+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2411", initial_release_date: "2019-08-07T15:19:38+00:00", revision_history: [ { date: "2019-08-07T15:19:38+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-07T15:19:38+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T03:13:16+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat CodeReady Linux Builder (v. 8)", product: { name: "Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::crb", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "perf-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "perf-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "perf-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "perf-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "perf-0:4.18.0-80.7.2.el8_0.s390x", product_id: "perf-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", product: { name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", product_id: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-doc@4.18.0-80.7.2.el8_0?arch=noarch", }, }, }, { category: "product_version", name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", product: { name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", product_id: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.7.2.el8_0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.src", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.src", product_id: "kernel-0:4.18.0-80.7.2.el8_0.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.src", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.src as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.src", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2019-1125", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2019-06-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1724389", }, ], notes: [ { category: "description", text: "A Spectre gadget was found in the Linux kernel's implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", title: "Vulnerability description", }, { category: "summary", text: "kernel: hw: Spectre SWAPGS gadget vulnerability", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-1125", }, { category: "external", summary: "RHBZ#1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-1125", url: "https://www.cve.org/CVERecord?id=CVE-2019-1125", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", }, ], release_date: "2019-08-06T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T15:19:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { category: "workaround", details: "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "kernel: hw: Spectre SWAPGS gadget vulnerability", }, { cve: "CVE-2019-13272", cwe: { id: "CWE-271", name: "Privilege Dropping / Lowering Errors", }, discovery_date: "2019-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1730895", }, ], notes: [ { category: "description", text: "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "RHBZ#1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-13272", url: "https://www.cve.org/CVERecord?id=CVE-2019-13272", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-07-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T15:19:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { category: "workaround", details: "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-12-10T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", }, ], }
RHSA-2019:2411
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2411", url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/4329821", url: "https://access.redhat.com/articles/4329821", }, { category: "external", summary: "1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2411.json", }, ], title: "Red Hat Security Advisory: kernel security update", tracking: { current_release_date: "2025-02-06T14:00:26+00:00", generator: { date: "2025-02-06T14:00:26+00:00", engine: { name: "Red Hat SDEngine", version: "4.3.0", }, }, id: "RHSA-2019:2411", initial_release_date: "2019-08-07T15:19:38+00:00", revision_history: [ { date: "2019-08-07T15:19:38+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-07T15:19:38+00:00", number: "2", summary: "Last updated version", }, { date: "2025-02-06T14:00:26+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat CodeReady Linux Builder (v. 8)", product: { name: "Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::crb", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "perf-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "perf-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "perf-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "perf-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "perf-0:4.18.0-80.7.2.el8_0.s390x", product_id: "perf-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", product: { name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", product_id: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-doc@4.18.0-80.7.2.el8_0?arch=noarch", }, }, }, { category: "product_version", name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", product: { name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", product_id: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.7.2.el8_0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.src", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.src", product_id: "kernel-0:4.18.0-80.7.2.el8_0.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.src", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.src as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.src", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2019-1125", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2019-06-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1724389", }, ], notes: [ { category: "description", text: "A Spectre gadget was found in the Linux kernel's implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", title: "Vulnerability description", }, { category: "summary", text: "kernel: hw: Spectre SWAPGS gadget vulnerability", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-1125", }, { category: "external", summary: "RHBZ#1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-1125", url: "https://www.cve.org/CVERecord?id=CVE-2019-1125", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", }, ], release_date: "2019-08-06T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T15:19:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { category: "workaround", details: "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "kernel: hw: Spectre SWAPGS gadget vulnerability", }, { cve: "CVE-2019-13272", cwe: { id: "CWE-271", name: "Privilege Dropping / Lowering Errors", }, discovery_date: "2019-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1730895", }, ], notes: [ { category: "description", text: "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "RHBZ#1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-13272", url: "https://www.cve.org/CVERecord?id=CVE-2019-13272", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-07-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T15:19:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { category: "workaround", details: "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-12-10T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", }, ], }
rhsa-2019:2411
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2411", url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/4329821", url: "https://access.redhat.com/articles/4329821", }, { category: "external", summary: "1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2411.json", }, ], title: "Red Hat Security Advisory: kernel security update", tracking: { current_release_date: "2025-02-06T14:00:26+00:00", generator: { date: "2025-02-06T14:00:26+00:00", engine: { name: "Red Hat SDEngine", version: "4.3.0", }, }, id: "RHSA-2019:2411", initial_release_date: "2019-08-07T15:19:38+00:00", revision_history: [ { date: "2019-08-07T15:19:38+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-07T15:19:38+00:00", number: "2", summary: "Last updated version", }, { date: "2025-02-06T14:00:26+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat CodeReady Linux Builder (v. 8)", product: { name: "Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::crb", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "perf-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "perf-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "perf-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "perf-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "perf-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "perf-0:4.18.0-80.7.2.el8_0.s390x", product_id: "perf-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", product_id: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", product_id: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_id: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, { category: "product_version", name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_id: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", product: { name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", product_id: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-doc@4.18.0-80.7.2.el8_0?arch=noarch", }, }, }, { category: "product_version", name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", product: { name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", product_id: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.7.2.el8_0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-0:4.18.0-80.7.2.el8_0.src", product: { name: "kernel-0:4.18.0-80.7.2.el8_0.src", product_id: "kernel-0:4.18.0-80.7.2.el8_0.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.src", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "BaseOS-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.src as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.src", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", }, product_reference: "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", relates_to_product_reference: "CRB-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", product_id: "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", }, product_reference: "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", relates_to_product_reference: "CRB-8.0.0.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2019-1125", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2019-06-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1724389", }, ], notes: [ { category: "description", text: "A Spectre gadget was found in the Linux kernel's implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", title: "Vulnerability description", }, { category: "summary", text: "kernel: hw: Spectre SWAPGS gadget vulnerability", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-1125", }, { category: "external", summary: "RHBZ#1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-1125", url: "https://www.cve.org/CVERecord?id=CVE-2019-1125", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", }, ], release_date: "2019-08-06T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T15:19:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { category: "workaround", details: "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "kernel: hw: Spectre SWAPGS gadget vulnerability", }, { cve: "CVE-2019-13272", cwe: { id: "CWE-271", name: "Privilege Dropping / Lowering Errors", }, discovery_date: "2019-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1730895", }, ], notes: [ { category: "description", text: "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "RHBZ#1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-13272", url: "https://www.cve.org/CVERecord?id=CVE-2019-13272", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-07-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T15:19:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { category: "workaround", details: "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", product_ids: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-12-10T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", }, ], }
rhsa-2019:2405
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2405", url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/4329821", url: "https://access.redhat.com/articles/4329821", }, { category: "external", summary: "1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2405.json", }, ], title: "Red Hat Security Advisory: kernel-rt security update", tracking: { current_release_date: "2025-02-06T13:59:26+00:00", generator: { date: "2025-02-06T13:59:26+00:00", engine: { name: "Red Hat SDEngine", version: "4.3.0", }, }, id: "RHSA-2019:2405", initial_release_date: "2019-08-07T12:58:31+00:00", revision_history: [ { date: "2019-08-07T12:58:31+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-07T12:58:31+00:00", number: "2", summary: "Last updated version", }, { date: "2025-02-06T13:59:26+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Real Time for NFV (v. 8)", product: { name: "Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::nfv", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Real Time (v. 8)", product: { name: "Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::realtime", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-modules@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-core@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-devel@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", product: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", product_id: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.2.rt9.154.el8_0?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2019-1125", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2019-06-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1724389", }, ], notes: [ { category: "description", text: "A Spectre gadget was found in the Linux kernel's implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", title: "Vulnerability description", }, { category: "summary", text: "kernel: hw: Spectre SWAPGS gadget vulnerability", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-1125", }, { category: "external", summary: "RHBZ#1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-1125", url: "https://www.cve.org/CVERecord?id=CVE-2019-1125", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", }, ], release_date: "2019-08-06T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T12:58:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { category: "workaround", details: "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "kernel: hw: Spectre SWAPGS gadget vulnerability", }, { cve: "CVE-2019-13272", cwe: { id: "CWE-271", name: "Privilege Dropping / Lowering Errors", }, discovery_date: "2019-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1730895", }, ], notes: [ { category: "description", text: "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "RHBZ#1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-13272", url: "https://www.cve.org/CVERecord?id=CVE-2019-13272", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-07-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T12:58:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { category: "workaround", details: "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-12-10T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", }, ], }
rhsa-2019_2405
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2405", url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/4329821", url: "https://access.redhat.com/articles/4329821", }, { category: "external", summary: "1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2405.json", }, ], title: "Red Hat Security Advisory: kernel-rt security update", tracking: { current_release_date: "2024-11-15T03:13:22+00:00", generator: { date: "2024-11-15T03:13:22+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2405", initial_release_date: "2019-08-07T12:58:31+00:00", revision_history: [ { date: "2019-08-07T12:58:31+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-07T12:58:31+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T03:13:22+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Real Time for NFV (v. 8)", product: { name: "Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::nfv", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Real Time (v. 8)", product: { name: "Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::realtime", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-modules@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-core@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-devel@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, { category: "product_version", name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product: { name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_id: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", product: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", product_id: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.2.rt9.154.el8_0?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", product_id: "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "NFV-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", product_id: "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", }, product_reference: "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", relates_to_product_reference: "RT-8.0.0.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2019-1125", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2019-06-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1724389", }, ], notes: [ { category: "description", text: "A Spectre gadget was found in the Linux kernel's implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", title: "Vulnerability description", }, { category: "summary", text: "kernel: hw: Spectre SWAPGS gadget vulnerability", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-1125", }, { category: "external", summary: "RHBZ#1724389", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1724389", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-1125", url: "https://www.cve.org/CVERecord?id=CVE-2019-1125", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", }, ], release_date: "2019-08-06T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T12:58:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { category: "workaround", details: "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "kernel: hw: Spectre SWAPGS gadget vulnerability", }, { cve: "CVE-2019-13272", cwe: { id: "CWE-271", name: "Privilege Dropping / Lowering Errors", }, discovery_date: "2019-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1730895", }, ], notes: [ { category: "description", text: "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "RHBZ#1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-13272", url: "https://www.cve.org/CVERecord?id=CVE-2019-13272", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-07-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T12:58:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { category: "workaround", details: "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", product_ids: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-12-10T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", }, ], }
rhsa-2019:2809
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974)\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [kernel-alt]: BUG: unable to handle kernel NULL pointer IP: crypto_remove_spawns+0x118/0x2e0 (BZ#1536967)\n\n* [HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages (BZ#1610534)\n\n* RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1673613)\n\n* RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in FIPS mode (BZ#1673979)\n\n* RHEL-Alt-7.6 - System crashed after oom - During ICP deployment (BZ#1710304)\n\n* kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127)\n\n* RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3 cores in quad and misses last core. (CORAL) (BZ#1717836)\n\n* RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN (BZ#1717906)\n\n* fragmented packets timing out (BZ#1729066)\n\n* Backport TCP follow-up for small buffers (BZ#1733617)\n\nEnhancement(s):\n\n* RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading nest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2809", url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1664110", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1664110", }, { category: "external", summary: "1671913", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1671913", }, { category: "external", summary: "1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2809.json", }, ], title: "Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-15T08:26:15+00:00", generator: { date: "2024-11-15T08:26:15+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2809", initial_release_date: "2019-09-20T12:04:26+00:00", revision_history: [ { date: "2019-09-20T12:04:26+00:00", number: "1", summary: "Initial version", }, { date: "2019-09-20T12:04:26+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T08:26:15+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "perf-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "perf-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", product: { name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_id: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.12.1.el7a?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", product: { name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", product_id: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.12.1.el7a?arch=noarch", }, }, }, { category: "product_version", name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", product: { name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", product_id: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-doc@4.14.0-115.12.1.el7a?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-alt-0:4.14.0-115.12.1.el7a.src", product: { name: "kernel-alt-0:4.14.0-115.12.1.el7a.src", product_id: "kernel-alt-0:4.14.0-115.12.1.el7a.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-alt@4.14.0-115.12.1.el7a?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.12.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.12.1.el7a.src", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.12.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.12.1.el7a.src", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, ], }, vulnerabilities: [ { cve: "CVE-2019-5489", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2019-01-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1664110", }, ], notes: [ { category: "description", text: "A new software page cache side channel attack scenario was discovered in operating systems that implement the very common 'page cache' caching mechanism. A malicious user/process could use 'in memory' page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.", title: "Vulnerability description", }, { category: "summary", text: "Kernel: page cache side channel attacks", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-5489", }, { category: "external", summary: "RHBZ#1664110", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1664110", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-5489", url: "https://www.cve.org/CVERecord?id=CVE-2019-5489", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-5489", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-5489", }, ], release_date: "2019-01-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-09-20T12:04:26+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2809", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "Kernel: page cache side channel attacks", }, { acknowledgments: [ { names: [ "Jann Horn", ], organization: "Google", }, ], cve: "CVE-2019-6974", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2019-01-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1671913", }, ], notes: [ { category: "description", text: "A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor implements its device control API. While creating a device via kvm_ioctl_create_device(), the device holds a reference to a VM object, later this reference is transferred to the caller's file descriptor table. If such file descriptor was to be closed, reference count to the VM object could become zero, potentially leading to a use-after-free issue. A user/process could use this flaw to crash the guest VM resulting in a denial of service issue or, potentially, gain privileged access to a system.", title: "Vulnerability description", }, { category: "summary", text: "Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()", title: "Vulnerability summary", }, { category: "other", text: "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-6974", }, { category: "external", summary: "RHBZ#1671913", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1671913", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-6974", url: "https://www.cve.org/CVERecord?id=CVE-2019-6974", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-6974", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-6974", }, ], release_date: "2019-02-07T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-09-20T12:04:26+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2809", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()", }, { cve: "CVE-2019-13272", cwe: { id: "CWE-271", name: "Privilege Dropping / Lowering Errors", }, discovery_date: "2019-07-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1730895", }, ], notes: [ { category: "description", text: "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-13272", }, { category: "external", summary: "RHBZ#1730895", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-13272", url: "https://www.cve.org/CVERecord?id=CVE-2019-13272", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-07-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-09-20T12:04:26+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { category: "workaround", details: "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", ], }, ], threats: [ { category: "exploit_status", date: "2021-12-10T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", }, ], }
fkie_cve-2019-13272
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ cisaActionDue: "2022-06-10", cisaExploitAdd: "2021-12-10", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Linux Kernel Improper Privilege Management Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "AA88B130-CD8A-4E14-A1F5-4D1DB031D60E", versionEndExcluding: "3.16.71", versionStartIncluding: "3.16.52", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "CD709672-0E6A-4086-8700-B6C2FDD8599C", versionEndExcluding: "4.2", versionStartIncluding: "4.1.39", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "19FB5FC5-740B-418F-B83A-3EA6095270C0", versionEndExcluding: "4.4.185", versionStartIncluding: "4.4.40", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "66431BA1-01B5-476A-B483-AE4E7B830BA7", versionEndExcluding: "4.9", versionStartIncluding: "4.8.16", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "8A719867-AEB7-4E95-A1DE-B96EA092D9FE", versionEndExcluding: "4.9.185", versionStartIncluding: "4.9.1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "00D95A2F-5B17-46D9-80D7-2E0D1779C2CE", versionEndExcluding: "4.14.133", versionStartIncluding: "4.10", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "F921620B-E2A7-421F-8C89-016C51723C17", versionEndExcluding: "4.19.58", versionStartIncluding: "4.15", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "7049E422-0D4B-45FD-8B06-04BACD44A66E", versionEndExcluding: "5.1.17", versionStartIncluding: "4.20", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", matchCriteriaId: "D100F7CE-FC64-4CC6-852A-6136D72DA419", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", matchCriteriaId: "B3293E55-5506-4587-A318-D1734F781C09", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", matchCriteriaId: "CD783B0C-9246-47D9-A937-6144FE8BFF0F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:7.0_aarch64:*:*:*:*:*:*:*", matchCriteriaId: "AA559D29-DF65-48AF-96DB-D20A50474758", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*", matchCriteriaId: "2148300C-ECBD-4ED5-A164-79629859DD43", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", matchCriteriaId: "CBF9BCF3-187F-410A-96CA-9C47D3ED6924", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8.0:*:*:*:*:*:*:*", matchCriteriaId: "782C86CD-1B68-410A-A096-E5170AD24DA2", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*", matchCriteriaId: "77C61DDC-81F3-4E2D-9CAA-17A256C85443", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*", matchCriteriaId: "B6B0DA79-DF12-4418-B075-F048C9E2979A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*", matchCriteriaId: "6D5DE3C5-B090-4CE7-9AF2-DEB379D7D5FC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.8:*:*:*:*:*:*:*", matchCriteriaId: "DF7275A1-8853-469E-939B-7533E9E8C499", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*", matchCriteriaId: "B92409A9-0D6B-4B7E-8847-1B63837D201F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*", matchCriteriaId: "C5C5860E-9FEB-4259-92FD-A85911E2F99E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*", matchCriteriaId: "CCE99A08-D6F7-4937-8154-65062BC88009", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.8:*:*:*:*:*:*:*", matchCriteriaId: "665DF1D3-EB88-4A17-B888-3B3CE298269B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "952F55C9-7E7C-4539-9D08-E736B3488569", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*", matchCriteriaId: "9FED1B0D-F901-413A-85D9-05D4C427570D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", matchCriteriaId: "CDDF61B7-EC5C-467C-B710-B89F502CD04F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", matchCriteriaId: "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", matchCriteriaId: "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", matchCriteriaId: "24B8DB06-590A-4008-B0AB-FCD1401C77C6", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "BD1E9594-C46F-40D1-8BC2-6B16635B55C4", versionEndIncluding: "11.60.3", versionStartIncluding: "11.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C19813-E823-456A-B1CE-EC0684CE1953", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*", matchCriteriaId: "146A767F-DC04-454B-9913-17D3A2B5AAA4", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", matchCriteriaId: "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", vulnerable: true, }, { criteria: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", matchCriteriaId: "AD7447BC-F315-4298-A822-549942FC118B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", }, { lang: "es", value: "En el kernel de Linux anterior a versión 5.1.17, ptrace_link en el archivo kernel/ptrace.c maneja inapropiadamente la grabación de las credenciales de un proceso que desea crear una relación de ptrace, que permite a los usuarios locales obtener acceso de root aprovechando determinados escenarios con un relación de proceso padre-hijo, donde un padre elimina los privilegios y llama a execve (permitiendo potencialmente el control por parte de un atacante). Un factor que contribuye es un problema de vida útil del objeto (que también puede causar un pánico). Otro factor que contribuye es el marcado incorrecto de una relación de ptrace como privilegiada, que puede ser explotada mediante (por ejemplo) el ayudante pkexec de Polkit con PTRACE_TRACEME. NOTA: deny_ptrace de SELinux puede ser una solución útil en algunos entornos.", }, ], id: "CVE-2019-13272", lastModified: "2025-04-03T20:28:35.577", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2019-07-17T13:15:10.687", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Jul/30", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Jul/33", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190806-0001/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K91025336", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4093-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4094-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4095-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4117-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4118-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4484", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Jul/30", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Jul/33", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190806-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K91025336", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4093-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4094-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4095-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4117-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4118-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4484", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
var-201907-1641
Vulnerability from variot
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. 8) - aarch64, noarch, ppc64le, s390x, x86_64
For the oldstable distribution (stretch), this problem has been fixed in version 4.9.168-1+deb9u4.
For the stable distribution (buster), this problem has been fixed in version 4.19.37-5+deb10u1. This update includes as well a patch for a regression introduced by the original fix for CVE-2019-11478 (#930904).
For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl0zJkBfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SvYw/8CJrPtf7juWLaRa3m/LvFewU+BppoJqNaVUbQNXVT90PgH/zDWVbpkJ4g Tr4MW6tzRKnAfUS+jObsnR9jGo871ZZ2wtlcM3W0bMnCwK6tPnTGiqTauflPXf2X KW8V3YLI6W6MxPlSLa2EQkDJ/RfTke4SwQDFDX0lzYjC5LwCwDwKIWBC6P5xBg6w yxNh6PHv9++ES8SKYpU3oMlWG43fJZJ8Oyy7Wdk0H84Qcjxb8FDP2iWyRf0Mvb+5 1uFosUswfN89imMrIFdYhv/z7CYFeHgYA0lPIvQ1gpNWOflrGqoMYL1Pys95mVCV RdRBtWy2atPHos6HEgw85cxaTS9Ss9FYB0sL+QCqIdw5ZwTt5+QR+JLNvJ53VKEm BxE5TncjlEAOc9t74xti/vBW2eCjp7IPaMP8X8eqWKiaMGJBlwaJEPUSmL4SiZo+ cW1plAYxc0CYq4lDWo3fcR7tBMQfp1ffDYUNn3DXvHChF1Ebi3zIdGl+oSeNP8hW OuaH6/P+qko0S/TNXAK5uaekrzjYv2pWm6xoM10fMVXiT8GiyjIGmSTTu6WvaiCA ITdy+o/jAfBiQsdFer2MYUna8QxjOy3XClKsy9+yjrj8ciekC4nOPHdz3/CYfOha cojPRl2Qd2KSWfEUoze2IqPrr3iAnKFKH6a+WU1XQZuo6r3uo0Q= =fTIm -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-rt security update Advisory ID: RHSA-2019:2405-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:2405 Issue date: 2019-08-07 CVE Names: CVE-2019-1125 CVE-2019-13272 ==================================================================== 1. Summary:
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Real Time (v. 8) - x86_64 Red Hat Enterprise Linux Real Time for NFV (v. 8) - x86_64
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
-
kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)
-
kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1724389 - CVE-2019-1125 kernel: hw: Spectre SWAPGS gadget vulnerability 1730895 - CVE-2019-13272 kernel: broken permission and object lifetime handling for PTRACE_TRACEME
- Package List:
Red Hat Enterprise Linux Real Time for NFV (v. 8):
Source: kernel-rt-4.18.0-80.7.2.rt9.154.el8_0.src.rpm
x86_64: kernel-rt-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-core-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-core-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-devel-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-kvm-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-kvm-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-modules-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-devel-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-kvm-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-kvm-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-modules-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-modules-extra-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm
Red Hat Enterprise Linux Real Time (v. 8):
Source: kernel-rt-4.18.0-80.7.2.rt9.154.el8_0.src.rpm
x86_64: kernel-rt-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-core-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-core-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-devel-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-kvm-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-modules-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-devel-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-kvm-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-modules-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm kernel-rt-modules-extra-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXUrK4dzjgjWX9erEAQiOhg//Qd9OLSZWYYMQZc0JtfXTpTIUWwmNIDwY op8ZxpNTBc3+UCYCqGZ3QmZ2pCxo9gJly5gtTrGzs6fVjecR5DxdgGeNgeJMwbpl ZPmxOSCNtfFx3qz9s0/ByV04a/+ORcuPJcKtNzS9qt9P2yw8pomG0iSycWJ+Gpgq F+SmqrQJxe63FgyC5sB7qShJAyGuhcZ656ppSQGDdpdg1FodnUfnJZDUaxOlkD6Q Ll6CNRioZEVyWxamwb7t/uN5RFGYtKnPM3zHqFAcMDsAftxhiPL/dMm2wbmFLwWq ZYa5HOAeFtN1FCamY0P63t0udQ4/7EbBQSqpbQOIWD9QcAW4TwOCIrYJWiyuMk0P MJ8mSxxVRnLh7LJsmOqVmoYLEDeKqbDrjVm2R2RMaDJYn0UEkfF1grD0GxuO9UKM FRtKykdeGoedB+O65alJOvX86twBE7cRxWz4KwZjNaw4OMy6RO6dbz/M/bbN9OzT 9o7LM7aK8qUMmSUVQ2+SKcDprNd9UivAsZe/SyOvVDEOPPztQDXhnQSd6S2mxGlM KtN0YKVngDIhc2gkIJCVQaucfhZ+miK9v1yjMU61t+LKJ2bjRa67VWJODU9xbWS/ 0qAmg6lowHdsX3GW9i8quGX2kSBK3AQ6Kbpv54A16N3MTkg1quI7EpkS8U7zEJCn qgIfQE0nJy8=+GEc -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================= Ubuntu Security Notice USN-4094-1 August 13, 2019
linux, linux-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux: Linux kernel - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke-4.15: Linux kernel for Google Container Engine (GKE) systems - linux-kvm: Linux kernel for cloud environments - linux-oem: Linux kernel for OEM processors - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-snapdragon: Linux kernel for Snapdragon processors - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-hwe: Linux hardware enablement (HWE) kernel
Details:
It was discovered that the alarmtimer implementation in the Linux kernel contained an integer overflow vulnerability. A local attacker could use this to cause a denial of service. (CVE-2018-13053)
Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly track inode validations. An attacker could use this to construct a malicious XFS image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13093)
Wen Xu discovered that the f2fs file system implementation in the Linux kernel did not properly validate metadata. An attacker could use this to construct a malicious f2fs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13097, CVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14616, CVE-2018-13096, CVE-2018-13098, CVE-2018-14615)
Wen Xu and Po-Ning Tseng discovered that btrfs file system implementation in the Linux kernel did not properly validate metadata. An attacker could use this to construct a malicious btrfs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613, CVE-2018-14609)
Wen Xu discovered that the HFS+ filesystem implementation in the Linux kernel did not properly handle malformed catalog data in some situations. An attacker could use this to construct a malicious HFS+ image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14617)
Vasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem of the Linux kernel did not properly initialize new files in some situations. A local attacker could use this to expose sensitive information. (CVE-2018-16862)
Hui Peng and Mathias Payer discovered that the USB subsystem in the Linux kernel did not properly handle size checks when handling an extra USB descriptor. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2018-20169)
It was discovered that a use-after-free error existed in the block layer subsystem of the Linux kernel when certain failure conditions occurred. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-20856)
Eli Biham and Lior Neumann discovered that the Bluetooth implementation in the Linux kernel did not properly validate elliptic curve parameters during Diffie-Hellman key exchange in some situations. An attacker could use this to expose sensitive information. (CVE-2018-5383)
It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-10126)
Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-1125)
It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12614)
It was discovered that a NULL pointer dereference vulnerabilty existed in the Near-field communication (NFC) implementation in the Linux kernel. An attacker could use this to cause a denial of service (system crash). (CVE-2019-12818)
It was discovered that the MDIO bus devices subsystem in the Linux kernel improperly dropped a device reference in an error condition, leading to a use-after-free. An attacker could use this to cause a denial of service (system crash). (CVE-2019-12819)
It was discovered that a NULL pointer dereference vulnerability existed in the Near-field communication (NFC) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-12984)
Jann Horn discovered a use-after-free vulnerability in the Linux kernel when accessing LDT entries in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-13233)
Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2019-13272)
It was discovered that the Empia EM28xx DVB USB device driver implementation in the Linux kernel contained a use-after-free vulnerability when disconnecting the device. An attacker could use this to cause a denial of service (system crash). (CVE-2019-2024)
It was discovered that the USB video device class implementation in the Linux kernel did not properly validate control bits, resulting in an out of bounds buffer read. A local attacker could use this to possibly expose sensitive information (kernel memory). (CVE-2019-2101)
It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-3846)
It was discovered that the Appletalk IP encapsulation driver in the Linux kernel did not properly prevent kernel addresses from being copied to user space. A local attacker with the CAP_NET_ADMIN capability could use this to expose sensitive information. (CVE-2018-20511)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: linux-image-4.15.0-1021-oracle 4.15.0-1021.23 linux-image-4.15.0-1040-gcp 4.15.0-1040.42 linux-image-4.15.0-1040-gke 4.15.0-1040.42 linux-image-4.15.0-1042-kvm 4.15.0-1042.42 linux-image-4.15.0-1043-raspi2 4.15.0-1043.46 linux-image-4.15.0-1050-oem 4.15.0-1050.57 linux-image-4.15.0-1060-snapdragon 4.15.0-1060.66 linux-image-4.15.0-58-generic 4.15.0-58.64 linux-image-4.15.0-58-generic-lpae 4.15.0-58.64 linux-image-4.15.0-58-lowlatency 4.15.0-58.64 linux-image-gcp 4.15.0.1040.42 linux-image-generic 4.15.0.58.60 linux-image-generic-lpae 4.15.0.58.60 linux-image-gke 4.15.0.1040.43 linux-image-gke-4.15 4.15.0.1040.43 linux-image-kvm 4.15.0.1042.42 linux-image-lowlatency 4.15.0.58.60 linux-image-oem 4.15.0.1050.54 linux-image-oracle 4.15.0.1021.24 linux-image-powerpc-e500mc 4.15.0.58.60 linux-image-powerpc-smp 4.15.0.58.60 linux-image-powerpc64-emb 4.15.0.58.60 linux-image-powerpc64-smp 4.15.0.58.60 linux-image-raspi2 4.15.0.1043.41 linux-image-snapdragon 4.15.0.1060.63 linux-image-virtual 4.15.0.58.60
Ubuntu 16.04 LTS: linux-image-4.15.0-1021-oracle 4.15.0-1021.23~16.04.1 linux-image-4.15.0-1040-gcp 4.15.0-1040.42~16.04.1 linux-image-4.15.0-1055-azure 4.15.0-1055.60 linux-image-4.15.0-58-generic 4.15.0-58.64~16.04.1 linux-image-4.15.0-58-generic-lpae 4.15.0-58.64~16.04.1 linux-image-4.15.0-58-lowlatency 4.15.0-58.64~16.04.1 linux-image-azure 4.15.0.1055.58 linux-image-gcp 4.15.0.1040.54 linux-image-generic-hwe-16.04 4.15.0.58.79 linux-image-generic-lpae-hwe-16.04 4.15.0.58.79 linux-image-gke 4.15.0.1040.54 linux-image-lowlatency-hwe-16.04 4.15.0.58.79 linux-image-oem 4.15.0.58.79 linux-image-oracle 4.15.0.1021.15 linux-image-virtual-hwe-16.04 4.15.0.58.79
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4094-1 CVE-2018-13053, CVE-2018-13093, CVE-2018-13096, CVE-2018-13097, CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14609, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613, CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-14617, CVE-2018-16862, CVE-2018-20169, CVE-2018-20511, CVE-2018-20856, CVE-2018-5383, CVE-2019-10126, CVE-2019-1125, CVE-2019-12614, CVE-2019-12818, CVE-2019-12819, CVE-2019-12984, CVE-2019-13233, CVE-2019-13272, CVE-2019-2024, CVE-2019-2101, CVE-2019-3846
Package Information: https://launchpad.net/ubuntu/+source/linux/4.15.0-58.64 https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42 https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1040.42 https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1042.42 https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1050.57 https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23 https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1043.46 https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1060.66 https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1055.60 https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42~16.04.1 https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-58.64~16.04.1 https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23~16.04.1 . (CVE-2019-10126)
Amit Klein and Benny Pinkas discovered that the Linux kernel did not sufficiently randomize IP ID values generated for connectionless networking protocols. (CVE-2019-13272)
Update instructions:
The problem can be corrected by updating your livepatches to the following versions:
| Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-148.174 | 54.1 | lowlatency, generic | | 4.4.0-150.176 | 54.1 | generic, lowlatency | | 4.4.0-151.178 | 54.1 | lowlatency, generic | | 4.4.0-154.181 | 54.1 | lowlatency, generic | | 4.4.0-157.185 | 54.1 | lowlatency, generic | | 4.15.0-50.54 | 54.2 | generic, lowlatency | | 4.15.0-50.54~16.04.1 | 54.2 | generic, lowlatency | | 4.15.0-51.55 | 54.2 | generic, lowlatency | | 4.15.0-51.55~16.04.1 | 54.2 | generic, lowlatency | | 4.15.0-52.56 | 54.2 | lowlatency, generic | | 4.15.0-52.56~16.04.1 | 54.2 | generic, lowlatency | | 4.15.0-54.58 | 54.2 | generic, lowlatency | | 4.15.0-54.58~16.04.1 | 54.2 | generic, lowlatency | | 4.15.0-55.60 | 54.2 | generic, lowlatency |
References: CVE-2018-1129, CVE-2019-2101, CVE-2019-3846, CVE-2019-10126, CVE-2019-12614, CVE-2019-12818, CVE-2019-12819, CVE-2019-12984, CVE-2019-13272
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-1641", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "enterprise linux for real time for nfv", scope: "eq", trust: 1, vendor: "redhat", version: "8.0", }, { model: "enterprise linux for real time for nfv tus", scope: "eq", trust: 1, vendor: "redhat", version: "8.2", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "10.0", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "19.04", }, { model: "enterprise linux for real time tus", scope: "eq", trust: 1, vendor: "redhat", version: "8.2", }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.4.185", }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.19.58", }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.4.40", }, { model: "enterprise linux", scope: "eq", trust: 1, vendor: "redhat", version: "7.0", }, { model: "enterprise linux for real time for nfv tus", scope: "eq", trust: 1, vendor: "redhat", version: "8.6", }, { model: "enterprise linux for real time tus", scope: "eq", trust: 1, vendor: "redhat", version: "8.6", }, { model: "service processor", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.9.185", }, { model: "h410c", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "lte", trust: 1, vendor: "netapp", version: "11.60.3", }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.9", }, { model: "enterprise linux for real time for nfv tus", scope: "eq", trust: 1, vendor: "redhat", version: "8.8", }, { model: "active iq unified manager", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "8.0", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "29", }, { model: "enterprise linux for real time tus", scope: "eq", trust: 1, vendor: "redhat", version: "8.8", }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.14.133", }, { model: "enterprise linux for arm 64", scope: "eq", trust: 1, vendor: "redhat", version: "7.0_aarch64", }, { model: "solidfire", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.1.39", }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.2", }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.15", }, { model: "h610s", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "gte", trust: 1, vendor: "netapp", version: "11.0.0", }, { model: "steelstore cloud integrated storage", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "3.16.52", }, { model: "hci management node", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "18.04", }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.9.1", }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.10", }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "5.1.17", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "16.04", }, { model: "e-series performance analyzer", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "enterprise linux for real time", scope: "eq", trust: 1, vendor: "redhat", version: "8", }, { model: "enterprise linux for real time for nfv tus", scope: "eq", trust: 1, vendor: "redhat", version: "8.4", }, { model: "aff a700s", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "enterprise linux", scope: "eq", trust: 1, vendor: "redhat", version: "8.0", }, { model: "enterprise linux for real time tus", scope: "eq", trust: 1, vendor: "redhat", version: "8.4", }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.8.16", }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "3.16.71", }, { model: "hci compute node", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.20", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "9.0", }, { model: "enterprise linux for ibm z systems", scope: "eq", trust: 1, vendor: "redhat", version: "7.0_s390x", }, ], sources: [ { db: "NVD", id: "CVE-2019-13272", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Google Security Research, Ventsislav Varbanovski,Metasploit,nu11secur1ty,Jann Horn,bcoles", sources: [ { db: "CNNVD", id: "CNNVD-201907-809", }, ], trust: 0.6, }, cve: "CVE-2019-13272", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "CVE-2019-13272", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 1.1, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, id: "CVE-2019-13272", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2019-13272", trust: 1, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201907-809", trust: 0.6, value: "HIGH", }, { author: "VULMON", id: "CVE-2019-13272", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULMON", id: "CVE-2019-13272", }, { db: "CNNVD", id: "CNNVD-201907-809", }, { db: "NVD", id: "CVE-2019-13272", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nFor the oldstable distribution (stretch), this problem has been fixed\nin version 4.9.168-1+deb9u4. \n\nFor the stable distribution (buster), this problem has been fixed in\nversion 4.19.37-5+deb10u1. This update includes as well a patch for a\nregression introduced by the original fix for CVE-2019-11478 (#930904). \n\nFor the detailed security status of linux please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\ncojPRl2Qd2KSWfEUoze2IqPrr3iAnKFKH6a+WU1XQZuo6r3uo0Q=\n=fTIm\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel-rt security update\nAdvisory ID: RHSA-2019:2405-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:2405\nIssue date: 2019-08-07\nCVE Names: CVE-2019-1125 CVE-2019-13272\n====================================================================\n1. Summary:\n\nAn update for kernel-rt is now available for Red Hat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Real Time (v. 8) - x86_64\nRed Hat Enterprise Linux Real Time for NFV (v. 8) - x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nSecurity Fix(es):\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME\n(CVE-2019-13272)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1724389 - CVE-2019-1125 kernel: hw: Spectre SWAPGS gadget vulnerability\n1730895 - CVE-2019-13272 kernel: broken permission and object lifetime handling for PTRACE_TRACEME\n\n6. Package List:\n\nRed Hat Enterprise Linux Real Time for NFV (v. 8):\n\nSource:\nkernel-rt-4.18.0-80.7.2.rt9.154.el8_0.src.rpm\n\nx86_64:\nkernel-rt-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-core-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-core-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-devel-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-kvm-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-kvm-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-modules-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-modules-extra-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debuginfo-common-x86_64-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-devel-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-kvm-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-kvm-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-modules-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-modules-extra-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\n\nRed Hat Enterprise Linux Real Time (v. 8):\n\nSource:\nkernel-rt-4.18.0-80.7.2.rt9.154.el8_0.src.rpm\n\nx86_64:\nkernel-rt-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-core-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-core-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-devel-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-kvm-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-modules-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debug-modules-extra-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-debuginfo-common-x86_64-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-devel-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-kvm-debuginfo-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-modules-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\nkernel-rt-modules-extra-4.18.0-80.7.2.rt9.154.el8_0.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nqgIfQE0nJy8=+GEc\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. =========================================================================\nUbuntu Security Notice USN-4094-1\nAugust 13, 2019\n\nlinux, linux-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-kvm,\nlinux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems\n- linux-gke-4.15: Linux kernel for Google Container Engine (GKE) systems\n- linux-kvm: Linux kernel for cloud environments\n- linux-oem: Linux kernel for OEM processors\n- linux-oracle: Linux kernel for Oracle Cloud systems\n- linux-raspi2: Linux kernel for Raspberry Pi 2\n- linux-snapdragon: Linux kernel for Snapdragon processors\n- linux-azure: Linux kernel for Microsoft Azure Cloud systems\n- linux-hwe: Linux hardware enablement (HWE) kernel\n\nDetails:\n\nIt was discovered that the alarmtimer implementation in the Linux kernel\ncontained an integer overflow vulnerability. A local attacker could use\nthis to cause a denial of service. (CVE-2018-13053)\n\nWen Xu discovered that the XFS filesystem implementation in the Linux\nkernel did not properly track inode validations. An attacker could use this\nto construct a malicious XFS image that, when mounted, could cause a denial\nof service (system crash). (CVE-2018-13093)\n\nWen Xu discovered that the f2fs file system implementation in the\nLinux kernel did not properly validate metadata. An attacker could\nuse this to construct a malicious f2fs image that, when mounted,\ncould cause a denial of service (system crash). (CVE-2018-13097,\nCVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14616,\nCVE-2018-13096, CVE-2018-13098, CVE-2018-14615)\n\nWen Xu and Po-Ning Tseng discovered that btrfs file system\nimplementation in the Linux kernel did not properly validate\nmetadata. An attacker could use this to construct a malicious\nbtrfs image that, when mounted, could cause a denial of service\n(system crash). (CVE-2018-14610, CVE-2018-14611, CVE-2018-14612,\nCVE-2018-14613, CVE-2018-14609)\n\nWen Xu discovered that the HFS+ filesystem implementation in the Linux\nkernel did not properly handle malformed catalog data in some situations. \nAn attacker could use this to construct a malicious HFS+ image that, when\nmounted, could cause a denial of service (system crash). (CVE-2018-14617)\n\nVasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem\nof the Linux kernel did not properly initialize new files in some\nsituations. A local attacker could use this to expose sensitive\ninformation. (CVE-2018-16862)\n\nHui Peng and Mathias Payer discovered that the USB subsystem in the Linux\nkernel did not properly handle size checks when handling an extra USB\ndescriptor. A physically proximate attacker could use this to cause a\ndenial of service (system crash). (CVE-2018-20169)\n\nIt was discovered that a use-after-free error existed in the block layer\nsubsystem of the Linux kernel when certain failure conditions occurred. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2018-20856)\n\nEli Biham and Lior Neumann discovered that the Bluetooth implementation in\nthe Linux kernel did not properly validate elliptic curve parameters during\nDiffie-Hellman key exchange in some situations. An attacker could use this\nto expose sensitive information. (CVE-2018-5383)\n\nIt was discovered that a heap buffer overflow existed in the Marvell\nWireless LAN device driver for the Linux kernel. An attacker could use this\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2019-10126)\n\nAndrei Vlad Lutas and Dan Lutas discovered that some x86 processors\nincorrectly handle SWAPGS instructions during speculative execution. A\nlocal attacker could use this to expose sensitive information (kernel\nmemory). (CVE-2019-1125)\n\nIt was discovered that the PowerPC dlpar implementation in the Linux kernel\ndid not properly check for allocation errors in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2019-12614)\n\nIt was discovered that a NULL pointer dereference vulnerabilty existed in\nthe Near-field communication (NFC) implementation in the Linux kernel. An\nattacker could use this to cause a denial of service (system crash). \n(CVE-2019-12818)\n\nIt was discovered that the MDIO bus devices subsystem in the Linux kernel\nimproperly dropped a device reference in an error condition, leading to a\nuse-after-free. An attacker could use this to cause a denial of service\n(system crash). (CVE-2019-12819)\n\nIt was discovered that a NULL pointer dereference vulnerability existed in\nthe Near-field communication (NFC) implementation in the Linux kernel. A\nlocal attacker could use this to cause a denial of service (system crash). \n(CVE-2019-12984)\n\nJann Horn discovered a use-after-free vulnerability in the Linux kernel\nwhen accessing LDT entries in some situations. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-13233)\n\nJann Horn discovered that the ptrace implementation in the Linux kernel did\nnot properly record credentials in some situations. A local attacker could\nuse this to cause a denial of service (system crash) or possibly gain\nadministrative privileges. (CVE-2019-13272)\n\nIt was discovered that the Empia EM28xx DVB USB device driver\nimplementation in the Linux kernel contained a use-after-free vulnerability\nwhen disconnecting the device. An attacker could use this to cause a denial\nof service (system crash). (CVE-2019-2024)\n\nIt was discovered that the USB video device class implementation in the\nLinux kernel did not properly validate control bits, resulting in an out of\nbounds buffer read. A local attacker could use this to possibly expose\nsensitive information (kernel memory). (CVE-2019-2101)\n\nIt was discovered that the Marvell Wireless LAN device driver in the Linux\nkernel did not properly validate the BSS descriptor. A local attacker could\npossibly use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-3846)\n\nIt was discovered that the Appletalk IP encapsulation driver in the Linux\nkernel did not properly prevent kernel addresses from being copied to user\nspace. A local attacker with the CAP_NET_ADMIN capability could use this to\nexpose sensitive information. (CVE-2018-20511)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n linux-image-4.15.0-1021-oracle 4.15.0-1021.23\n linux-image-4.15.0-1040-gcp 4.15.0-1040.42\n linux-image-4.15.0-1040-gke 4.15.0-1040.42\n linux-image-4.15.0-1042-kvm 4.15.0-1042.42\n linux-image-4.15.0-1043-raspi2 4.15.0-1043.46\n linux-image-4.15.0-1050-oem 4.15.0-1050.57\n linux-image-4.15.0-1060-snapdragon 4.15.0-1060.66\n linux-image-4.15.0-58-generic 4.15.0-58.64\n linux-image-4.15.0-58-generic-lpae 4.15.0-58.64\n linux-image-4.15.0-58-lowlatency 4.15.0-58.64\n linux-image-gcp 4.15.0.1040.42\n linux-image-generic 4.15.0.58.60\n linux-image-generic-lpae 4.15.0.58.60\n linux-image-gke 4.15.0.1040.43\n linux-image-gke-4.15 4.15.0.1040.43\n linux-image-kvm 4.15.0.1042.42\n linux-image-lowlatency 4.15.0.58.60\n linux-image-oem 4.15.0.1050.54\n linux-image-oracle 4.15.0.1021.24\n linux-image-powerpc-e500mc 4.15.0.58.60\n linux-image-powerpc-smp 4.15.0.58.60\n linux-image-powerpc64-emb 4.15.0.58.60\n linux-image-powerpc64-smp 4.15.0.58.60\n linux-image-raspi2 4.15.0.1043.41\n linux-image-snapdragon 4.15.0.1060.63\n linux-image-virtual 4.15.0.58.60\n\nUbuntu 16.04 LTS:\n linux-image-4.15.0-1021-oracle 4.15.0-1021.23~16.04.1\n linux-image-4.15.0-1040-gcp 4.15.0-1040.42~16.04.1\n linux-image-4.15.0-1055-azure 4.15.0-1055.60\n linux-image-4.15.0-58-generic 4.15.0-58.64~16.04.1\n linux-image-4.15.0-58-generic-lpae 4.15.0-58.64~16.04.1\n linux-image-4.15.0-58-lowlatency 4.15.0-58.64~16.04.1\n linux-image-azure 4.15.0.1055.58\n linux-image-gcp 4.15.0.1040.54\n linux-image-generic-hwe-16.04 4.15.0.58.79\n linux-image-generic-lpae-hwe-16.04 4.15.0.58.79\n linux-image-gke 4.15.0.1040.54\n linux-image-lowlatency-hwe-16.04 4.15.0.58.79\n linux-image-oem 4.15.0.58.79\n linux-image-oracle 4.15.0.1021.15\n linux-image-virtual-hwe-16.04 4.15.0.58.79\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/4094-1\n CVE-2018-13053, CVE-2018-13093, CVE-2018-13096, CVE-2018-13097,\n CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14609,\n CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613,\n CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-14617,\n CVE-2018-16862, CVE-2018-20169, CVE-2018-20511, CVE-2018-20856,\n CVE-2018-5383, CVE-2019-10126, CVE-2019-1125, CVE-2019-12614,\n CVE-2019-12818, CVE-2019-12819, CVE-2019-12984, CVE-2019-13233,\n CVE-2019-13272, CVE-2019-2024, CVE-2019-2101, CVE-2019-3846\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux/4.15.0-58.64\n https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42\n https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1040.42\n https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1042.42\n https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1050.57\n https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23\n https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1043.46\n https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1060.66\n https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1055.60\n https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42~16.04.1\n https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-58.64~16.04.1\n https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23~16.04.1\n. (CVE-2019-10126)\n\nAmit Klein and Benny Pinkas discovered that the Linux kernel did not\nsufficiently randomize IP ID values generated for connectionless networking\nprotocols. (CVE-2019-13272)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your livepatches to the following\nversions:\n\n| Kernel | Version | flavors |\n|--------------------------+----------+--------------------------|\n| 4.4.0-148.174 | 54.1 | lowlatency, generic |\n| 4.4.0-150.176 | 54.1 | generic, lowlatency |\n| 4.4.0-151.178 | 54.1 | lowlatency, generic |\n| 4.4.0-154.181 | 54.1 | lowlatency, generic |\n| 4.4.0-157.185 | 54.1 | lowlatency, generic |\n| 4.15.0-50.54 | 54.2 | generic, lowlatency |\n| 4.15.0-50.54~16.04.1 | 54.2 | generic, lowlatency |\n| 4.15.0-51.55 | 54.2 | generic, lowlatency |\n| 4.15.0-51.55~16.04.1 | 54.2 | generic, lowlatency |\n| 4.15.0-52.56 | 54.2 | lowlatency, generic |\n| 4.15.0-52.56~16.04.1 | 54.2 | generic, lowlatency |\n| 4.15.0-54.58 | 54.2 | generic, lowlatency |\n| 4.15.0-54.58~16.04.1 | 54.2 | generic, lowlatency |\n| 4.15.0-55.60 | 54.2 | generic, lowlatency |\n\nReferences:\n CVE-2018-1129, CVE-2019-2101, CVE-2019-3846, CVE-2019-10126, \n CVE-2019-12614, CVE-2019-12818, CVE-2019-12819, CVE-2019-12984, \n CVE-2019-13272\n\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n", sources: [ { db: "NVD", id: "CVE-2019-13272", }, { db: "VULMON", id: "CVE-2019-13272", }, { db: "PACKETSTORM", id: "154044", }, { db: "PACKETSTORM", id: "153972", }, { db: "PACKETSTORM", id: "154045", }, { db: "PACKETSTORM", id: "153699", }, { db: "PACKETSTORM", id: "153970", }, { db: "PACKETSTORM", id: "154043", }, { db: "PACKETSTORM", id: "154316", }, { db: "PACKETSTORM", id: "154245", }, ], trust: 1.71, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=47133", trust: 0.3, type: "exploit", }, ], sources: [ { db: "VULMON", id: "CVE-2019-13272", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-13272", trust: 2.5, }, { db: "PACKETSTORM", id: "154245", trust: 1.7, }, { db: "PACKETSTORM", id: "153663", trust: 1.6, }, { db: "PACKETSTORM", id: "156929", trust: 1.6, }, { db: "PACKETSTORM", id: "154957", trust: 1.6, }, { db: "PACKETSTORM", id: "153702", trust: 1.6, }, { db: "PACKETSTORM", id: "165051", trust: 1.6, }, { db: "AUSCERT", id: "ESB-2019.4646", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.2704", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4346", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4252", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.2749", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4346.2", trust: 0.6, }, { db: "EXPLOIT-DB", id: "50541", trust: 0.6, }, { db: "EXPLOIT-DB", id: "47163", trust: 0.6, }, { db: "EXPLOIT-DB", id: "47133", trust: 0.6, }, { db: "LENOVO", id: "LEN-29592", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201907-809", trust: 0.6, }, { db: "VULMON", id: "CVE-2019-13272", trust: 0.1, }, { db: "PACKETSTORM", id: "154044", trust: 0.1, }, { db: "PACKETSTORM", id: "153972", trust: 0.1, }, { db: "PACKETSTORM", id: "154045", trust: 0.1, }, { db: "PACKETSTORM", id: "153699", trust: 0.1, }, { db: "PACKETSTORM", id: "153970", trust: 0.1, }, { db: "PACKETSTORM", id: "154043", trust: 0.1, }, { db: "PACKETSTORM", id: "154316", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2019-13272", }, { db: "PACKETSTORM", id: "154044", }, { db: "PACKETSTORM", id: "153972", }, { db: "PACKETSTORM", id: "154045", }, { db: "PACKETSTORM", id: "153699", }, { db: "PACKETSTORM", id: "153970", }, { db: "PACKETSTORM", id: "154043", }, { db: "PACKETSTORM", id: "154316", }, { db: "PACKETSTORM", id: "154245", }, { db: "CNNVD", id: "CNNVD-201907-809", }, { db: "NVD", id: "CVE-2019-13272", }, ], }, id: "VAR-201907-1641", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.30555555, }, last_update_date: "2024-11-29T19:42:02.986000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Red Hat: Important: kernel security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192411 - Security Advisory", }, { title: "Red Hat: Important: kernel-rt security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192405 - Security Advisory", }, { title: "Debian Security Advisories: DSA-4484-1 linux -- security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=f7aec913c227117e479ebfa6af2b1b9a", }, { title: "Red Hat: CVE-2019-13272", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2019-13272", }, { title: "Ubuntu Security Notice: linux, linux-hwe, linux-azure, linux-gcp, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4093-1", }, { title: "Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4095-1", }, { title: "Ubuntu Security Notice: linux-aws vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4117-1", }, { title: "IBM: IBM Security Bulletin: Linux Kernel vulnerabilities affect IBM Spectrum Protect Plus CVE-2019-10140, CVE-2019-11477, CVE-2019-11478, CVE-2019-11479, CVE-2019-13233, CVE-2019-13272, CVE-2019-14283, CVE-2019-14284, CVE-2019-15090, CVE-2019-15807, CVE-2019-15925", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=d9cd8f6d11c68af77f2f2bd27ca37bed", }, { title: "Ubuntu Security Notice: linux, linux-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4094-1", }, { title: "IBM: Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (March 2021)", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=afc44ca312a83d419e062241c4789aae", }, { title: "Ubuntu Security Notice: linux-aws vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4118-1", }, { title: "Siemens Security Advisories: Siemens Security Advisory", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d", }, { title: "CVE-2019-13272 - Pkexec Local Privilege Escalation", trust: 0.1, url: "https://github.com/asepsaepdin/CVE-2019-13272 ", }, ], sources: [ { db: "VULMON", id: "CVE-2019-13272", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-noinfo", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2019-13272", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.2, url: "http://packetstormsecurity.com/files/165051/linux-kernel-5.1.x-ptrace_traceme-pkexec-local-privilege-escalation.html", }, { trust: 2.2, url: "http://packetstormsecurity.com/files/153663/linux-ptrace_traceme-broken-permission-object-lifetime-handling.html", }, { trust: 2.2, url: "http://packetstormsecurity.com/files/156929/linux-ptrace_traceme-local-root.html", }, { trust: 2.2, url: "https://www.debian.org/security/2019/dsa-4484", }, { trust: 2.2, url: "http://packetstormsecurity.com/files/153702/slackware-security-advisory-slackware-14.2-kernel-updates.html", }, { trust: 2.2, url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html", }, { trust: 1.7, url: "https://access.redhat.com/errata/rhsa-2019:2411", }, { trust: 1.7, url: "https://access.redhat.com/errata/rhsa-2019:2405", }, { trust: 1.6, url: "http://packetstormsecurity.com/files/154957/linux-polkit-pkexec-helper-ptrace_traceme-local-root.html", }, { trust: 1.6, url: "https://security.netapp.com/advisory/ntap-20190806-0001/", }, { trust: 1.6, url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.1.17", }, { trust: 1.6, url: "https://support.f5.com/csp/article/k91025336", }, { trust: 1.6, url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html", }, { trust: 1.6, url: "https://seclists.org/bugtraq/2019/jul/30", }, { trust: 1.6, url: "https://usn.ubuntu.com/4094-1/", }, { trust: 1.6, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { trust: 1.6, url: "https://seclists.org/bugtraq/2019/jul/33", }, { trust: 1.6, url: "https://access.redhat.com/errata/rhsa-2019:2809", }, { trust: 1.6, url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { trust: 1.6, url: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", }, { trust: 1.6, url: "https://usn.ubuntu.com/4117-1/", }, { trust: 1.6, url: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { trust: 1.6, url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", }, { trust: 1.6, url: "https://usn.ubuntu.com/4093-1/", }, { trust: 1.6, url: "https://usn.ubuntu.com/4095-1/", }, { trust: 1.6, url: "http://packetstormsecurity.com/files/154245/kernel-live-patch-security-notice-lsn-0054-1.html", }, { trust: 1.6, url: "https://usn.ubuntu.com/4118-1/", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-13272", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ogrk5lywbj4e4sri4dkx367nhysi3voh/", }, { trust: 1, url: "https://support.f5.com/csp/article/k91025336?utm_source=f5support&%3butm_medium=rss", }, { trust: 0.6, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ogrk5lywbj4e4sri4dkx367nhysi3voh/", }, { trust: 0.6, url: "https://support.f5.com/csp/article/k91025336?utm_source=f5support&utm_medium=rss", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html", }, { trust: 0.6, url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193255-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193252-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193249-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193248-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193247-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193258-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193260-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193261-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193263-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193246-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.2704/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.2749/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4646/", }, { trust: 0.6, url: "https://support.lenovo.com/us/en/product_security/len-29592", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4346/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4252/", }, { trust: 0.6, url: "https://www.exploit-db.com/exploits/50541", }, { trust: 0.6, url: "https://www.exploit-db.com/exploits/47133", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/linux-kernel-privilege-escalation-via-ptrace-link-29820", }, { trust: 0.6, url: "https://www.exploit-db.com/exploits/47163", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/153663/linux-ptrace/traceme-broken-permission-object-lifetime-handling.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4346.2/", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2019-1125", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2019-10126", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2019-3846", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-12614", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-12984", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2019-13233", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2018-5383", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-1125", }, { trust: 0.2, url: "https://www.redhat.com/mailman/listinfo/rhsa-announce", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-13272", }, { trust: 0.2, url: "https://bugzilla.redhat.com/):", }, { trust: 0.2, url: "https://access.redhat.com/security/team/key/", }, { trust: 0.2, url: "https://access.redhat.com/articles/4329821", }, { trust: 0.2, url: "https://access.redhat.com/articles/11258", }, { trust: 0.2, url: "https://access.redhat.com/security/team/contact/", }, { trust: 0.2, url: "https://access.redhat.com/security/updates/classification/#important", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-12818", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-2101", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-12819", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-11599", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1054.61", }, { trust: 0.1, url: "https://usn.ubuntu.com/4095-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux/4.4.0-159.187", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1122.128", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1090.101", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1118.127", }, { trust: 0.1, url: "https://usn.ubuntu.com/4093-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1013.14", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1013.13", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-25.26~18.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-snapdragon/5.0.0-1018.19", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1014.14", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1014.14~18.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux/5.0.0-25.26", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1014.14", }, { trust: 0.1, url: "https://security-tracker.debian.org/tracker/linux", }, { trust: 0.1, url: "https://www.debian.org/security/", }, { trust: 0.1, url: "https://www.debian.org/security/faq", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-16862", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-2024", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-14610", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-20856", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1050.57", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42~16.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23~16.04.1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-13098", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-14609", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-13093", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-20169", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-14614", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1043.46", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1042.42", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-13053", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1040.42", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42", }, { trust: 0.1, url: "https://usn.ubuntu.com/4094-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1055.60", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux/4.15.0-58.64", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-13099", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-58.64~16.04.1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-20511", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1060.66", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-13100", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-13096", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-14613", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-14617", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-10638", }, { trust: 0.1, url: "https://usn.ubuntu.com/4117-1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-3900", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-14284", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-14283", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1014.16", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-1129", }, { trust: 0.1, url: "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce", }, ], sources: [ { db: "PACKETSTORM", id: "154044", }, { db: "PACKETSTORM", id: "153972", }, { db: "PACKETSTORM", id: "154045", }, { db: "PACKETSTORM", id: "153699", }, { db: "PACKETSTORM", id: "153970", }, { db: "PACKETSTORM", id: "154043", }, { db: "PACKETSTORM", id: "154316", }, { db: "PACKETSTORM", id: "154245", }, { db: "CNNVD", id: "CNNVD-201907-809", }, { db: "NVD", id: "CVE-2019-13272", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2019-13272", }, { db: "PACKETSTORM", id: "154044", }, { db: "PACKETSTORM", id: "153972", }, { db: "PACKETSTORM", id: "154045", }, { db: "PACKETSTORM", id: "153699", }, { db: "PACKETSTORM", id: "153970", }, { db: "PACKETSTORM", id: "154043", }, { db: "PACKETSTORM", id: "154316", }, { db: "PACKETSTORM", id: "154245", }, { db: "CNNVD", id: "CNNVD-201907-809", }, { db: "NVD", id: "CVE-2019-13272", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-07-17T00:00:00", db: "VULMON", id: "CVE-2019-13272", }, { date: "2019-08-13T17:45:06", db: "PACKETSTORM", id: "154044", }, { date: "2019-08-07T20:11:10", db: "PACKETSTORM", id: "153972", }, { date: "2019-08-13T17:45:15", db: "PACKETSTORM", id: "154045", }, { date: "2019-07-20T19:11:11", db: "PACKETSTORM", id: "153699", }, { date: "2019-08-07T20:10:41", db: "PACKETSTORM", id: "153970", }, { date: "2019-08-13T17:45:00", db: "PACKETSTORM", id: "154043", }, { date: "2019-09-02T23:48:33", db: "PACKETSTORM", id: "154316", }, { date: "2019-08-28T23:02:22", db: "PACKETSTORM", id: "154245", }, { date: "2019-07-16T00:00:00", db: "CNNVD", id: "CNNVD-201907-809", }, { date: "2019-07-17T13:15:10.687000", db: "NVD", id: "CVE-2019-13272", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-11-07T00:00:00", db: "VULMON", id: "CVE-2019-13272", }, { date: "2021-11-25T00:00:00", db: "CNNVD", id: "CNNVD-201907-809", }, { date: "2024-11-21T04:24:35.753000", db: "NVD", id: "CVE-2019-13272", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "PACKETSTORM", id: "154045", }, { db: "PACKETSTORM", id: "153699", }, { db: "PACKETSTORM", id: "154043", }, { db: "PACKETSTORM", id: "154245", }, { db: "CNNVD", id: "CNNVD-201907-809", }, ], trust: 1, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Linux kernel Permission Licensing and Access Control Issue Vulnerability", sources: [ { db: "CNNVD", id: "CNNVD-201907-809", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "permissions and access control issues", sources: [ { db: "CNNVD", id: "CNNVD-201907-809", }, ], trust: 0.6, }, }
gsd-2019-13272
Vulnerability from gsd
{ GSD: { alias: "CVE-2019-13272", description: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", id: "GSD-2019-13272", references: [ "https://www.suse.com/security/cve/CVE-2019-13272.html", "https://www.debian.org/security/2019/dsa-4484", "https://access.redhat.com/errata/RHSA-2019:2809", "https://access.redhat.com/errata/RHSA-2019:2411", "https://access.redhat.com/errata/RHSA-2019:2405", "https://ubuntu.com/security/CVE-2019-13272", "https://linux.oracle.com/cve/CVE-2019-13272.html", "https://packetstormsecurity.com/files/cve/CVE-2019-13272", "https://alas.aws.amazon.com/cve/html/CVE-2019-13272.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2019-13272", ], details: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", id: "GSD-2019-13272", modified: "2023-12-13T01:23:41.646056Z", schema_version: "1.4.0", }, }, namespaces: { "cisa.gov": { cveID: "CVE-2019-13272", dateAdded: "2021-12-10", dueDate: "2022-06-10", product: "Kernel", requiredAction: "Apply updates per vendor instructions.", shortDescription: "Kernel/ptrace.c in Linux kernel mishandles contains an improper privilege management vulnerability which allows local users to obtain root access.", vendorProject: "Linux", vulnerabilityName: "Linux Kernel Improper Privilege Management Vulnerability", }, "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-13272", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", }, { name: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", refsource: "MISC", url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", }, { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", refsource: "MISC", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", }, { name: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { name: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", refsource: "MISC", url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { name: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", refsource: "CONFIRM", url: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { name: "FEDORA-2019-a95015e60f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/", }, { name: "DSA-4484", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4484", }, { name: "20190722 [SECURITY] [DSA 4484-1] linux security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Jul/30", }, { name: "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Jul/33", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html", }, { name: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { name: "https://security.netapp.com/advisory/ntap-20190806-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190806-0001/", }, { name: "RHSA-2019:2405", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { name: "RHSA-2019:2411", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { name: "USN-4093-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4093-1/", }, { name: "USN-4094-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4094-1/", }, { name: "USN-4095-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4095-1/", }, { name: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", }, { name: "https://support.f5.com/csp/article/K91025336", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K91025336", }, { name: "USN-4117-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4117-1/", }, { name: "USN-4118-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4118-1/", }, { name: "RHSA-2019:2809", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { name: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS", }, { name: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", }, { name: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", }, { name: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.14.133", versionStartIncluding: "4.10", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.1.17", versionStartIncluding: "4.20", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.19.58", versionStartIncluding: "4.15", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.16.71", versionStartIncluding: "3.16.52", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.9.185", versionStartIncluding: "4.9.1", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.2", versionStartIncluding: "4.1.39", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.4.185", versionStartIncluding: "4.4.40", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.9", versionStartIncluding: "4.8.16", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "11.60.3", versionStartIncluding: "11.0.0", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-13272", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-269", }, ], }, ], }, references: { reference_data: [ { name: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", refsource: "MISC", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", }, { name: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", refsource: "MISC", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", }, { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", refsource: "MISC", tags: [ "Patch", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", }, { name: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { name: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", refsource: "MISC", tags: [ "Patch", "Vendor Advisory", ], url: "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", }, { name: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", refsource: "CONFIRM", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1140671", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", refsource: "CONFIRM", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", }, { name: "FEDORA-2019-a95015e60f", refsource: "FEDORA", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/", }, { name: "DSA-4484", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4484", }, { name: "20190722 [SECURITY] [DSA 4484-1] linux security update", refsource: "BUGTRAQ", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Jul/30", }, { name: "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", refsource: "BUGTRAQ", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Jul/33", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html", }, { name: "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html", }, { name: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", refsource: "MISC", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { name: "https://security.netapp.com/advisory/ntap-20190806-0001/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190806-0001/", }, { name: "RHSA-2019:2405", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2405", }, { name: "RHSA-2019:2411", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2411", }, { name: "USN-4095-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4095-1/", }, { name: "USN-4094-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4094-1/", }, { name: "USN-4093-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4093-1/", }, { name: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", refsource: "MISC", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", }, { name: "https://support.f5.com/csp/article/K91025336", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K91025336", }, { name: "USN-4117-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4117-1/", }, { name: "USN-4118-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4118-1/", }, { name: "RHSA-2019:2809", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2809", }, { name: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS", }, { name: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", refsource: "MISC", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", }, { name: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", refsource: "MISC", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", }, { name: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", refsource: "MISC", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2023-01-17T21:25Z", publishedDate: "2019-07-17T13:15Z", }, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.