{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel","title":"Title of the patch"},{"category":"description","text":"\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-16995: A memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c. if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).\n- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).\n- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).\n- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).\n- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).\n- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).\n- Add kernel module compression support (bsc#1135854)\n- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- ALSA: usb-audio: fix PCM device order (bsc#1051510).\n- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).\n- ALSA: usb-audio: remove some dead code (bsc#1051510).\n- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).\n- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- Blacklist 'signal: Correct namespace fixups of si_pid and si_uid' (bsc#1142667)\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- dasd_fba: Display '00000000' for zero page when dumping sense\n- /dev/mem: Bail out upon SIGKILL (git-fixes).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On<->Off changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix KVM kABI after x86 mmu backports (bsc#1117665).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain->updated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354).\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- Revert 'drm/amd/display: Fix underscan not using proper scaling' (bsc#1111666).\n- Revert 'drm/amd/powerplay: Enable/Disable NBPSTATE on On/OFF of UVD' (bsc#1111666).\n- Revert 'drm/radeon: Fix EEH during kexec' (bsc#1051510).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- Sign non-x86 kernels when possible (boo#1134303)\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n","title":"Description of the patch"},{"category":"details","text":"openSUSE-2019-2444","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2444-1.json"},{"category":"self","summary":"URL for openSUSE-SU-2019:2444-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN"},{"category":"self","summary":"E-Mail link for openSUSE-SU-2019:2444-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN"},{"category":"self","summary":"SUSE Bug 1046299","url":"https://bugzilla.suse.com/1046299"},{"category":"self","summary":"SUSE Bug 1046303","url":"https://bugzilla.suse.com/1046303"},{"category":"self","summary":"SUSE Bug 1046305","url":"https://bugzilla.suse.com/1046305"},{"category":"self","summary":"SUSE Bug 1050244","url":"https://bugzilla.suse.com/1050244"},{"category":"self","summary":"SUSE Bug 1050536","url":"https://bugzilla.suse.com/1050536"},{"category":"self","summary":"SUSE Bug 1050545","url":"https://bugzilla.suse.com/1050545"},{"category":"self","summary":"SUSE Bug 1051510","url":"https://bugzilla.suse.com/1051510"},{"category":"self","summary":"SUSE Bug 1055186","url":"https://bugzilla.suse.com/1055186"},{"category":"self","summary":"SUSE Bug 1061840","url":"https://bugzilla.suse.com/1061840"},{"category":"self","summary":"SUSE Bug 1064802","url":"https://bugzilla.suse.com/1064802"},{"category":"self","summary":"SUSE Bug 1065600","url":"https://bugzilla.suse.com/1065600"},{"category":"self","summary":"SUSE Bug 1066129","url":"https://bugzilla.suse.com/1066129"},{"category":"self","summary":"SUSE Bug 1073513","url":"https://bugzilla.suse.com/1073513"},{"category":"self","summary":"SUSE Bug 1082635","url":"https://bugzilla.suse.com/1082635"},{"category":"self","summary":"SUSE Bug 1083647","url":"https://bugzilla.suse.com/1083647"},{"category":"self","summary":"SUSE Bug 1086323","url":"https://bugzilla.suse.com/1086323"},{"category":"self","summary":"SUSE Bug 1087092","url":"https://bugzilla.suse.com/1087092"},{"category":"self","summary":"SUSE Bug 1089644","url":"https://bugzilla.suse.com/1089644"},{"category":"self","summary":"SUSE Bug 1093205","url":"https://bugzilla.suse.com/1093205"},{"category":"self","summary":"SUSE Bug 1097583","url":"https://bugzilla.suse.com/1097583"},{"category":"self","summary":"SUSE Bug 1097584","url":"https://bugzilla.suse.com/1097584"},{"category":"self","summary":"SUSE Bug 1097585","url":"https://bugzilla.suse.com/1097585"},{"category":"self","summary":"SUSE Bug 1097586","url":"https://bugzilla.suse.com/1097586"},{"category":"self","summary":"SUSE Bug 1097587","url":"https://bugzilla.suse.com/1097587"},{"category":"self","summary":"SUSE Bug 1097588","url":"https://bugzilla.suse.com/1097588"},{"category":"self","summary":"SUSE Bug 1098291","url":"https://bugzilla.suse.com/1098291"},{"category":"self","summary":"SUSE Bug 1101674","url":"https://bugzilla.suse.com/1101674"},{"category":"self","summary":"SUSE Bug 1109158","url":"https://bugzilla.suse.com/1109158"},{"category":"self","summary":"SUSE Bug 1111666","url":"https://bugzilla.suse.com/1111666"},{"category":"self","summary":"SUSE Bug 1112178","url":"https://bugzilla.suse.com/1112178"},{"category":"self","summary":"SUSE Bug 1113994","url":"https://bugzilla.suse.com/1113994"},{"category":"self","summary":"SUSE Bug 1114279","url":"https://bugzilla.suse.com/1114279"},{"category":"self","summary":"SUSE Bug 1117665","url":"https://bugzilla.suse.com/1117665"},{"category":"self","summary":"SUSE Bug 1123034","url":"https://bugzilla.suse.com/1123034"},{"category":"self","summary":"SUSE Bug 1123080","url":"https://bugzilla.suse.com/1123080"},{"category":"self","summary":"SUSE Bug 1133140","url":"https://bugzilla.suse.com/1133140"},{"category":"self","summary":"SUSE Bug 1134303","url":"https://bugzilla.suse.com/1134303"},{"category":"self","summary":"SUSE Bug 1135642","url":"https://bugzilla.suse.com/1135642"},{"category":"self","summary":"SUSE Bug 1135854","url":"https://bugzilla.suse.com/1135854"},{"category":"self","summary":"SUSE Bug 1135873","url":"https://bugzilla.suse.com/1135873"},{"category":"self","summary":"SUSE Bug 1137040","url":"https://bugzilla.suse.com/1137040"},{"category":"self","summary":"SUSE Bug 1137799","url":"https://bugzilla.suse.com/1137799"},{"category":"self","summary":"SUSE Bug 1137861","url":"https://bugzilla.suse.com/1137861"},{"category":"self","summary":"SUSE Bug 1140729","url":"https://bugzilla.suse.com/1140729"},{"category":"self","summary":"SUSE Bug 1140845","url":"https://bugzilla.suse.com/1140845"},{"category":"self","summary":"SUSE Bug 1140883","url":"https://bugzilla.suse.com/1140883"},{"category":"self","summary":"SUSE Bug 1141600","url":"https://bugzilla.suse.com/1141600"},{"category":"self","summary":"SUSE Bug 1142635","url":"https://bugzilla.suse.com/1142635"},{"category":"self","summary":"SUSE Bug 1142667","url":"https://bugzilla.suse.com/1142667"},{"category":"self","summary":"SUSE Bug 1143706","url":"https://bugzilla.suse.com/1143706"},{"category":"self","summary":"SUSE Bug 1144338","url":"https://bugzilla.suse.com/1144338"},{"category":"self","summary":"SUSE Bug 1144375","url":"https://bugzilla.suse.com/1144375"},{"category":"self","summary":"SUSE Bug 1144449","url":"https://bugzilla.suse.com/1144449"},{"category":"self","summary":"SUSE Bug 1145099","url":"https://bugzilla.suse.com/1145099"},{"category":"self","summary":"SUSE Bug 1146612","url":"https://bugzilla.suse.com/1146612"},{"category":"self","summary":"SUSE Bug 1148410","url":"https://bugzilla.suse.com/1148410"},{"category":"self","summary":"SUSE Bug 1149853","url":"https://bugzilla.suse.com/1149853"},{"category":"self","summary":"SUSE Bug 1150452","url":"https://bugzilla.suse.com/1150452"},{"category":"self","summary":"SUSE Bug 1150457","url":"https://bugzilla.suse.com/1150457"},{"category":"self","summary":"SUSE Bug 1150465","url":"https://bugzilla.suse.com/1150465"},{"category":"self","summary":"SUSE Bug 1150875","url":"https://bugzilla.suse.com/1150875"},{"category":"self","summary":"SUSE Bug 1151508","url":"https://bugzilla.suse.com/1151508"},{"category":"self","summary":"SUSE Bug 1151807","url":"https://bugzilla.suse.com/1151807"},{"category":"self","summary":"SUSE Bug 1152033","url":"https://bugzilla.suse.com/1152033"},{"category":"self","summary":"SUSE Bug 1152624","url":"https://bugzilla.suse.com/1152624"},{"category":"self","summary":"SUSE Bug 1152685","url":"https://bugzilla.suse.com/1152685"},{"category":"self","summary":"SUSE Bug 1152788","url":"https://bugzilla.suse.com/1152788"},{"category":"self","summary":"SUSE Bug 1152790","url":"https://bugzilla.suse.com/1152790"},{"category":"self","summary":"SUSE Bug 1152791","url":"https://bugzilla.suse.com/1152791"},{"category":"self","summary":"SUSE Bug 1153112","url":"https://bugzilla.suse.com/1153112"},{"category":"self","summary":"SUSE Bug 1153158","url":"https://bugzilla.suse.com/1153158"},{"category":"self","summary":"SUSE Bug 1153236","url":"https://bugzilla.suse.com/1153236"},{"category":"self","summary":"SUSE Bug 1153263","url":"https://bugzilla.suse.com/1153263"},{"category":"self","summary":"SUSE Bug 1153476","url":"https://bugzilla.suse.com/1153476"},{"category":"self","summary":"SUSE Bug 1153509","url":"https://bugzilla.suse.com/1153509"},{"category":"self","summary":"SUSE Bug 1153607","url":"https://bugzilla.suse.com/1153607"},{"category":"self","summary":"SUSE Bug 1153646","url":"https://bugzilla.suse.com/1153646"},{"category":"self","summary":"SUSE Bug 1153713","url":"https://bugzilla.suse.com/1153713"},{"category":"self","summary":"SUSE Bug 1153717","url":"https://bugzilla.suse.com/1153717"},{"category":"self","summary":"SUSE Bug 1153718","url":"https://bugzilla.suse.com/1153718"},{"category":"self","summary":"SUSE Bug 1153719","url":"https://bugzilla.suse.com/1153719"},{"category":"self","summary":"SUSE Bug 1153811","url":"https://bugzilla.suse.com/1153811"},{"category":"self","summary":"SUSE Bug 1153969","url":"https://bugzilla.suse.com/1153969"},{"category":"self","summary":"SUSE Bug 1154108","url":"https://bugzilla.suse.com/1154108"},{"category":"self","summary":"SUSE Bug 1154189","url":"https://bugzilla.suse.com/1154189"},{"category":"self","summary":"SUSE Bug 1154242","url":"https://bugzilla.suse.com/1154242"},{"category":"self","summary":"SUSE Bug 1154268","url":"https://bugzilla.suse.com/1154268"},{"category":"self","summary":"SUSE Bug 1154354","url":"https://bugzilla.suse.com/1154354"},{"category":"self","summary":"SUSE Bug 1154372","url":"https://bugzilla.suse.com/1154372"},{"category":"self","summary":"SUSE Bug 1154521","url":"https://bugzilla.suse.com/1154521"},{"category":"self","summary":"SUSE Bug 1154578","url":"https://bugzilla.suse.com/1154578"},{"category":"self","summary":"SUSE Bug 1154607","url":"https://bugzilla.suse.com/1154607"},{"category":"self","summary":"SUSE Bug 1154608","url":"https://bugzilla.suse.com/1154608"},{"category":"self","summary":"SUSE Bug 1154610","url":"https://bugzilla.suse.com/1154610"},{"category":"self","summary":"SUSE Bug 1154611","url":"https://bugzilla.suse.com/1154611"},{"category":"self","summary":"SUSE Bug 1154651","url":"https://bugzilla.suse.com/1154651"},{"category":"self","summary":"SUSE Bug 1154737","url":"https://bugzilla.suse.com/1154737"},{"category":"self","summary":"SUSE Bug 1154747","url":"https://bugzilla.suse.com/1154747"},{"category":"self","summary":"SUSE Bug 1154848","url":"https://bugzilla.suse.com/1154848"},{"category":"self","summary":"SUSE Bug 1155178","url":"https://bugzilla.suse.com/1155178"},{"category":"self","summary":"SUSE Bug 1155179","url":"https://bugzilla.suse.com/1155179"},{"category":"self","summary":"SUSE Bug 1155184","url":"https://bugzilla.suse.com/1155184"},{"category":"self","summary":"SUSE Bug 1155186","url":"https://bugzilla.suse.com/1155186"},{"category":"self","summary":"SUSE CVE CVE-2019-16232 page","url":"https://www.suse.com/security/cve/CVE-2019-16232/"},{"category":"self","summary":"SUSE CVE CVE-2019-16233 page","url":"https://www.suse.com/security/cve/CVE-2019-16233/"},{"category":"self","summary":"SUSE CVE CVE-2019-16234 page","url":"https://www.suse.com/security/cve/CVE-2019-16234/"},{"category":"self","summary":"SUSE CVE CVE-2019-16995 page","url":"https://www.suse.com/security/cve/CVE-2019-16995/"},{"category":"self","summary":"SUSE CVE CVE-2019-17056 page","url":"https://www.suse.com/security/cve/CVE-2019-17056/"},{"category":"self","summary":"SUSE CVE CVE-2019-17133 page","url":"https://www.suse.com/security/cve/CVE-2019-17133/"},{"category":"self","summary":"SUSE CVE CVE-2019-17666 page","url":"https://www.suse.com/security/cve/CVE-2019-17666/"}],"title":"Security update for the Linux Kernel","tracking":{"current_release_date":"2019-11-05T17:28:40Z","generator":{"date":"2019-11-05T17:28:40Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2019:2444-1","initial_release_date":"2019-11-05T17:28:40Z","revision_history":[{"date":"2019-11-05T17:28:40Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-devel-4.12.14-lp151.28.25.1.noarch","product":{"name":"kernel-devel-4.12.14-lp151.28.25.1.noarch","product_id":"kernel-devel-4.12.14-lp151.28.25.1.noarch"}},{"category":"product_version","name":"kernel-docs-4.12.14-lp151.28.25.1.noarch","product":{"name":"kernel-docs-4.12.14-lp151.28.25.1.noarch","product_id":"kernel-docs-4.12.14-lp151.28.25.1.noarch"}},{"category":"product_version","name":"kernel-docs-html-4.12.14-lp151.28.25.1.noarch","product":{"name":"kernel-docs-html-4.12.14-lp151.28.25.1.noarch","product_id":"kernel-docs-html-4.12.14-lp151.28.25.1.noarch"}},{"category":"product_version","name":"kernel-macros-4.12.14-lp151.28.25.1.noarch","product":{"name":"kernel-macros-4.12.14-lp151.28.25.1.noarch","product_id":"kernel-macros-4.12.14-lp151.28.25.1.noarch"}},{"category":"product_version","name":"kernel-source-4.12.14-lp151.28.25.1.noarch","product":{"name":"kernel-source-4.12.14-lp151.28.25.1.noarch","product_id":"kernel-source-4.12.14-lp151.28.25.1.noarch"}},{"category":"product_version","name":"kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","product":{"name":"kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","product_id":"kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"kernel-debug-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-debug-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-debug-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-debug-base-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-default-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-default-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-default-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-default-base-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-default-base-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-default-base-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-default-devel-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-obs-build-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-syms-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-syms-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-syms-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-vanilla-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64","product":{"name":"kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64","product_id":"kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Leap 15.1","product":{"name":"openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kernel-debug-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-debug-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-debug-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-default-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-default-base-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch"},"product_reference":"kernel-devel-4.12.14-lp151.28.25.1.noarch","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-docs-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch"},"product_reference":"kernel-docs-4.12.14-lp151.28.25.1.noarch","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-docs-html-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch"},"product_reference":"kernel-docs-html-4.12.14-lp151.28.25.1.noarch","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-macros-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch"},"product_reference":"kernel-macros-4.12.14-lp151.28.25.1.noarch","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-obs-build-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch"},"product_reference":"kernel-source-4.12.14-lp151.28.25.1.noarch","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch"},"product_reference":"kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-syms-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-vanilla-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"},"product_reference":"kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.1"}]},"vulnerabilities":[{"cve":"CVE-2019-16232","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-16232"}],"notes":[{"category":"general","text":"drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-16232","url":"https://www.suse.com/security/cve/CVE-2019-16232"},{"category":"external","summary":"SUSE Bug 1150465 for CVE-2019-16232","url":"https://bugzilla.suse.com/1150465"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"threats":[{"category":"impact","date":"2019-11-05T17:28:40Z","details":"moderate"}],"title":"CVE-2019-16232"},{"cve":"CVE-2019-16233","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-16233"}],"notes":[{"category":"general","text":"drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-16233","url":"https://www.suse.com/security/cve/CVE-2019-16233"},{"category":"external","summary":"SUSE Bug 1150457 for CVE-2019-16233","url":"https://bugzilla.suse.com/1150457"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"threats":[{"category":"impact","date":"2019-11-05T17:28:40Z","details":"moderate"}],"title":"CVE-2019-16233"},{"cve":"CVE-2019-16234","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-16234"}],"notes":[{"category":"general","text":"drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-16234","url":"https://www.suse.com/security/cve/CVE-2019-16234"},{"category":"external","summary":"SUSE Bug 1150452 for CVE-2019-16234","url":"https://bugzilla.suse.com/1150452"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"threats":[{"category":"impact","date":"2019-11-05T17:28:40Z","details":"low"}],"title":"CVE-2019-16234"},{"cve":"CVE-2019-16995","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-16995"}],"notes":[{"category":"general","text":"In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-16995","url":"https://www.suse.com/security/cve/CVE-2019-16995"},{"category":"external","summary":"SUSE Bug 1152685 for CVE-2019-16995","url":"https://bugzilla.suse.com/1152685"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.2,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"threats":[{"category":"impact","date":"2019-11-05T17:28:40Z","details":"moderate"}],"title":"CVE-2019-16995"},{"cve":"CVE-2019-17056","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-17056"}],"notes":[{"category":"general","text":"llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-17056","url":"https://www.suse.com/security/cve/CVE-2019-17056"},{"category":"external","summary":"SUSE Bug 1152788 for CVE-2019-17056","url":"https://bugzilla.suse.com/1152788"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"products":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"threats":[{"category":"impact","date":"2019-11-05T17:28:40Z","details":"moderate"}],"title":"CVE-2019-17056"},{"cve":"CVE-2019-17133","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-17133"}],"notes":[{"category":"general","text":"In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-17133","url":"https://www.suse.com/security/cve/CVE-2019-17133"},{"category":"external","summary":"SUSE Bug 1153158 for CVE-2019-17133","url":"https://bugzilla.suse.com/1153158"},{"category":"external","summary":"SUSE Bug 1153161 for CVE-2019-17133","url":"https://bugzilla.suse.com/1153161"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"threats":[{"category":"impact","date":"2019-11-05T17:28:40Z","details":"moderate"}],"title":"CVE-2019-17133"},{"cve":"CVE-2019-17666","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-17666"}],"notes":[{"category":"general","text":"rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-17666","url":"https://www.suse.com/security/cve/CVE-2019-17666"},{"category":"external","summary":"SUSE Bug 1154372 for CVE-2019-17666","url":"https://bugzilla.suse.com/1154372"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L","version":"3.0"},"products":["openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch","openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64","openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"]}],"threats":[{"category":"impact","date":"2019-11-05T17:28:40Z","details":"moderate"}],"title":"CVE-2019-17666"}]}