[openSUSE-SU-2022:0366-1] Security update for the Linux Kernel

Severity Critical
Affected Packages 21
CVEs 27

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
  • CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
  • CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c (bnc#1194087).
  • CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
  • CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
  • CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect a crafted USB device) to cause a denial of service. (bnc#1192847)
  • CVE-2021-43975: Fixed a flaw in hw_atl_utils_fw_rpc_wait that could allow an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value. (bsc#1192845)
  • CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
  • CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
  • CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).
  • CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
  • CVE-2021-4135: Fixed zero-initialize memory inside netdevsim for new map's value in function nsim_bpf_map_alloc (bsc#1193927).
  • CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
  • CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946).
  • CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
  • CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
  • CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
  • CVE-2021-33098: Fixed a potential denial of service in Intel(R) Ethernet ixgbe driver due to improper input validation. (bsc#1192877)
  • CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
  • CVE-2021-28714: Fixed issue with xen/netback to handle rx queue stall detection (XSA-392) (bsc#1193442).
  • CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
  • CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1193731).
  • CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device (bsc#1179599).
  • CVE-2019-15126: Fixed a vulnerability in Broadcom and Cypress Wi-Fi chips, used in RPi family of devices aka 'Kr00k'. (bsc#1167162)
  • CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).

The following non-security bugs were fixed:

  • Bluetooth: fix the erroneous flush_work() order (git-fixes).
  • Build: Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
  • ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241 bsc#1195166).
  • IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
  • elfcore: fix building with clang (bsc#1169514).
  • hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
  • ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241 bsc#1195166).
  • kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
  • kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358).
  • kernel-binary.spec.in: add zstd to BuildRequires if used
  • kernel-binary.spec.in: make sure zstd is supported by kmod if used
  • kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
  • kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
  • kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
  • kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
  • kernel-binary.spec: Fix kernel-default-base scriptlets after packaging merge.
  • kernel-binary.spec: Require dwarves for kernel-binary-devel when BTF is enabled (jsc#SLE-17288).
  • kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well.
  • kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#1189841).
  • kernel-source.spec: install-kernel-tools also required on 15.4
  • kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229). The semantic changed in an incompatible way so invoking the macro now causes a build failure.
  • kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
  • livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
  • memstick: rtsx_usb_ms: fix UAF (bsc#1194516).
  • moxart: fix potential use-after-free on remove path (bsc#1194516).
  • net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
  • net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
  • net: Using proper atomic helper (bsc#1186222).
  • net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
  • net: mana: Add RX fencing (bsc#1193506).
  • net: mana: Add XDP support (bsc#1193506).
  • net: mana: Allow setting the number of queues while the NIC is down (bsc#1193506).
  • net: mana: Fix spelling mistake 'calledd' -> 'called' (bsc#1193506).
  • net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#1193506).
  • net: mana: Improve the HWC error handling (bsc#1193506).
  • net: mana: Support hibernation and kexec (bsc#1193506).
  • net: mana: Use kcalloc() instead of kzalloc() (bsc#1193506).
  • objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
  • post.sh: detect /usr mountpoint too
  • recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
  • recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
  • rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible to use kmod with ZSTD support on non-Tumbleweed.
  • rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
  • rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306).
  • rpm/kernel-binary.spec: Use only non-empty certificates.
  • rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305).
  • rpm/kernel-source.rpmlintrc: ignore new include/config files.
  • rpm/kernel-source.spec.in: do some more for vanilla_only.
  • rpm: Abolish image suffix (bsc#1189841).
  • rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools.
  • rpm: Define $certs as rpm macro (bsc#1189841).
  • rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).
  • rpm: fix kmp install path
  • rpm: use _rpmmacrodir (boo#1191384)
  • tty: hvc: replace BUG_ON() with negative return value.
  • vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
  • x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (bsc#1169514).
  • xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
  • xen/blkfront: do not trust the backend response data blindly (git-fixes).
  • xen/blkfront: read response from backend only once (git-fixes).
  • xen/netfront: disentangle tx_skb_freelist (git-fixes).
  • xen/netfront: do not read data from request on the ring page (git-fixes).
  • xen/netfront: do not trust the backend response data blindly (git-fixes).
  • xen/netfront: read response from backend only once (git-fixes).
  • xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
  • xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
Package Affected Version
pkg:rpm/opensuse/kernel-zfcpdump-man?arch=s390x&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla?arch=x86_64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla?arch=s390x&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla?arch=ppc64le&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla?arch=aarch64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-livepatch-devel?arch=x86_64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-livepatch-devel?arch=s390x&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-livepatch-devel?arch=ppc64le&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-livepatch-devel?arch=aarch64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-devel?arch=x86_64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-devel?arch=s390x&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-devel?arch=ppc64le&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-devel?arch=aarch64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-base?arch=x86_64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-base?arch=s390x&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-base?arch=ppc64le&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-vanilla-base?arch=aarch64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-kvmsmall-base?arch=x86_64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-default-man?arch=s390x&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-debug-base?arch=x86_64&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
pkg:rpm/opensuse/kernel-debug-base?arch=ppc64le&distro=opensuse-leap-15.3 < 4.12.14-197.105.1
ID
openSUSE-SU-2022:0366-1
Severity
critical
URL
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/
Published
2022-02-10T16:40:07
(2 years ago)
Modified
2022-02-10T16:40:07
(2 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0366-1.json
Suse URL for openSUSE-SU-2022:0366-1 https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/
Suse E-Mail link for openSUSE-SU-2022:0366-1 https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/
Bugzilla SUSE Bug 1071995 https://bugzilla.suse.com/1071995
Bugzilla SUSE Bug 1124431 https://bugzilla.suse.com/1124431
Bugzilla SUSE Bug 1167162 https://bugzilla.suse.com/1167162
Bugzilla SUSE Bug 1169514 https://bugzilla.suse.com/1169514
Bugzilla SUSE Bug 1172073 https://bugzilla.suse.com/1172073
Bugzilla SUSE Bug 1179599 https://bugzilla.suse.com/1179599
Bugzilla SUSE Bug 1184804 https://bugzilla.suse.com/1184804
Bugzilla SUSE Bug 1185377 https://bugzilla.suse.com/1185377
Bugzilla SUSE Bug 1186207 https://bugzilla.suse.com/1186207
Bugzilla SUSE Bug 1186222 https://bugzilla.suse.com/1186222
Bugzilla SUSE Bug 1187167 https://bugzilla.suse.com/1187167
Bugzilla SUSE Bug 1189305 https://bugzilla.suse.com/1189305
Bugzilla SUSE Bug 1189841 https://bugzilla.suse.com/1189841
Bugzilla SUSE Bug 1190358 https://bugzilla.suse.com/1190358
Bugzilla SUSE Bug 1190428 https://bugzilla.suse.com/1190428
Bugzilla SUSE Bug 1191229 https://bugzilla.suse.com/1191229
Bugzilla SUSE Bug 1191241 https://bugzilla.suse.com/1191241
Bugzilla SUSE Bug 1191384 https://bugzilla.suse.com/1191384
Bugzilla SUSE Bug 1191731 https://bugzilla.suse.com/1191731
Bugzilla SUSE Bug 1192032 https://bugzilla.suse.com/1192032
Bugzilla SUSE Bug 1192267 https://bugzilla.suse.com/1192267
Bugzilla SUSE Bug 1192740 https://bugzilla.suse.com/1192740
Bugzilla SUSE Bug 1192845 https://bugzilla.suse.com/1192845
Bugzilla SUSE Bug 1192847 https://bugzilla.suse.com/1192847
Bugzilla SUSE Bug 1192877 https://bugzilla.suse.com/1192877
Bugzilla SUSE Bug 1192946 https://bugzilla.suse.com/1192946
Bugzilla SUSE Bug 1193306 https://bugzilla.suse.com/1193306
Bugzilla SUSE Bug 1193440 https://bugzilla.suse.com/1193440
Bugzilla SUSE Bug 1193442 https://bugzilla.suse.com/1193442
Bugzilla SUSE Bug 1193575 https://bugzilla.suse.com/1193575
Bugzilla SUSE Bug 1193669 https://bugzilla.suse.com/1193669
Bugzilla SUSE Bug 1193727 https://bugzilla.suse.com/1193727
Bugzilla SUSE Bug 1193731 https://bugzilla.suse.com/1193731
Bugzilla SUSE Bug 1193767 https://bugzilla.suse.com/1193767
Bugzilla SUSE Bug 1193861 https://bugzilla.suse.com/1193861
Bugzilla SUSE Bug 1193864 https://bugzilla.suse.com/1193864
Bugzilla SUSE Bug 1193867 https://bugzilla.suse.com/1193867
Bugzilla SUSE Bug 1193927 https://bugzilla.suse.com/1193927
Bugzilla SUSE Bug 1194001 https://bugzilla.suse.com/1194001
Bugzilla SUSE Bug 1194048 https://bugzilla.suse.com/1194048
Bugzilla SUSE Bug 1194087 https://bugzilla.suse.com/1194087
Bugzilla SUSE Bug 1194227 https://bugzilla.suse.com/1194227
Bugzilla SUSE Bug 1194302 https://bugzilla.suse.com/1194302
Bugzilla SUSE Bug 1194516 https://bugzilla.suse.com/1194516
Bugzilla SUSE Bug 1194529 https://bugzilla.suse.com/1194529
Bugzilla SUSE Bug 1194880 https://bugzilla.suse.com/1194880
Bugzilla SUSE Bug 1194888 https://bugzilla.suse.com/1194888
Bugzilla SUSE Bug 1194985 https://bugzilla.suse.com/1194985
Bugzilla SUSE Bug 1195166 https://bugzilla.suse.com/1195166
Bugzilla SUSE Bug 1195254 https://bugzilla.suse.com/1195254
CVE SUSE CVE CVE-2018-25020 page https://www.suse.com/security/cve/CVE-2018-25020/
CVE SUSE CVE CVE-2019-15126 page https://www.suse.com/security/cve/CVE-2019-15126/
CVE SUSE CVE CVE-2020-27820 page https://www.suse.com/security/cve/CVE-2020-27820/
CVE SUSE CVE CVE-2021-0920 page https://www.suse.com/security/cve/CVE-2021-0920/
CVE SUSE CVE CVE-2021-0935 page https://www.suse.com/security/cve/CVE-2021-0935/
CVE SUSE CVE CVE-2021-28711 page https://www.suse.com/security/cve/CVE-2021-28711/
CVE SUSE CVE CVE-2021-28712 page https://www.suse.com/security/cve/CVE-2021-28712/
CVE SUSE CVE CVE-2021-28713 page https://www.suse.com/security/cve/CVE-2021-28713/
CVE SUSE CVE CVE-2021-28714 page https://www.suse.com/security/cve/CVE-2021-28714/
CVE SUSE CVE CVE-2021-28715 page https://www.suse.com/security/cve/CVE-2021-28715/
CVE SUSE CVE CVE-2021-33098 page https://www.suse.com/security/cve/CVE-2021-33098/
CVE SUSE CVE CVE-2021-3564 page https://www.suse.com/security/cve/CVE-2021-3564/
CVE SUSE CVE CVE-2021-39648 page https://www.suse.com/security/cve/CVE-2021-39648/
CVE SUSE CVE CVE-2021-39657 page https://www.suse.com/security/cve/CVE-2021-39657/
CVE SUSE CVE CVE-2021-4002 page https://www.suse.com/security/cve/CVE-2021-4002/
CVE SUSE CVE CVE-2021-4083 page https://www.suse.com/security/cve/CVE-2021-4083/
CVE SUSE CVE CVE-2021-4135 page https://www.suse.com/security/cve/CVE-2021-4135/
CVE SUSE CVE CVE-2021-4149 page https://www.suse.com/security/cve/CVE-2021-4149/
CVE SUSE CVE CVE-2021-4197 page https://www.suse.com/security/cve/CVE-2021-4197/
CVE SUSE CVE CVE-2021-4202 page https://www.suse.com/security/cve/CVE-2021-4202/
CVE SUSE CVE CVE-2021-43975 page https://www.suse.com/security/cve/CVE-2021-43975/
CVE SUSE CVE CVE-2021-43976 page https://www.suse.com/security/cve/CVE-2021-43976/
CVE SUSE CVE CVE-2021-44733 page https://www.suse.com/security/cve/CVE-2021-44733/
CVE SUSE CVE CVE-2021-45095 page https://www.suse.com/security/cve/CVE-2021-45095/
CVE SUSE CVE CVE-2021-45486 page https://www.suse.com/security/cve/CVE-2021-45486/
CVE SUSE CVE CVE-2022-0322 page https://www.suse.com/security/cve/CVE-2022-0322/
CVE SUSE CVE CVE-2022-0330 page https://www.suse.com/security/cve/CVE-2022-0330/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/opensuse/kernel-zfcpdump-man?arch=s390x&distro=opensuse-leap-15.3 opensuse kernel-zfcpdump-man < 4.12.14-197.105.1 opensuse-leap-15.3 s390x
Affected pkg:rpm/opensuse/kernel-vanilla?arch=x86_64&distro=opensuse-leap-15.3 opensuse kernel-vanilla < 4.12.14-197.105.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/opensuse/kernel-vanilla?arch=s390x&distro=opensuse-leap-15.3 opensuse kernel-vanilla < 4.12.14-197.105.1 opensuse-leap-15.3 s390x
Affected pkg:rpm/opensuse/kernel-vanilla?arch=ppc64le&distro=opensuse-leap-15.3 opensuse kernel-vanilla < 4.12.14-197.105.1 opensuse-leap-15.3 ppc64le
Affected pkg:rpm/opensuse/kernel-vanilla?arch=aarch64&distro=opensuse-leap-15.3 opensuse kernel-vanilla < 4.12.14-197.105.1 opensuse-leap-15.3 aarch64
Affected pkg:rpm/opensuse/kernel-vanilla-livepatch-devel?arch=x86_64&distro=opensuse-leap-15.3 opensuse kernel-vanilla-livepatch-devel < 4.12.14-197.105.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/opensuse/kernel-vanilla-livepatch-devel?arch=s390x&distro=opensuse-leap-15.3 opensuse kernel-vanilla-livepatch-devel < 4.12.14-197.105.1 opensuse-leap-15.3 s390x
Affected pkg:rpm/opensuse/kernel-vanilla-livepatch-devel?arch=ppc64le&distro=opensuse-leap-15.3 opensuse kernel-vanilla-livepatch-devel < 4.12.14-197.105.1 opensuse-leap-15.3 ppc64le
Affected pkg:rpm/opensuse/kernel-vanilla-livepatch-devel?arch=aarch64&distro=opensuse-leap-15.3 opensuse kernel-vanilla-livepatch-devel < 4.12.14-197.105.1 opensuse-leap-15.3 aarch64
Affected pkg:rpm/opensuse/kernel-vanilla-devel?arch=x86_64&distro=opensuse-leap-15.3 opensuse kernel-vanilla-devel < 4.12.14-197.105.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/opensuse/kernel-vanilla-devel?arch=s390x&distro=opensuse-leap-15.3 opensuse kernel-vanilla-devel < 4.12.14-197.105.1 opensuse-leap-15.3 s390x
Affected pkg:rpm/opensuse/kernel-vanilla-devel?arch=ppc64le&distro=opensuse-leap-15.3 opensuse kernel-vanilla-devel < 4.12.14-197.105.1 opensuse-leap-15.3 ppc64le
Affected pkg:rpm/opensuse/kernel-vanilla-devel?arch=aarch64&distro=opensuse-leap-15.3 opensuse kernel-vanilla-devel < 4.12.14-197.105.1 opensuse-leap-15.3 aarch64
Affected pkg:rpm/opensuse/kernel-vanilla-base?arch=x86_64&distro=opensuse-leap-15.3 opensuse kernel-vanilla-base < 4.12.14-197.105.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/opensuse/kernel-vanilla-base?arch=s390x&distro=opensuse-leap-15.3 opensuse kernel-vanilla-base < 4.12.14-197.105.1 opensuse-leap-15.3 s390x
Affected pkg:rpm/opensuse/kernel-vanilla-base?arch=ppc64le&distro=opensuse-leap-15.3 opensuse kernel-vanilla-base < 4.12.14-197.105.1 opensuse-leap-15.3 ppc64le
Affected pkg:rpm/opensuse/kernel-vanilla-base?arch=aarch64&distro=opensuse-leap-15.3 opensuse kernel-vanilla-base < 4.12.14-197.105.1 opensuse-leap-15.3 aarch64
Affected pkg:rpm/opensuse/kernel-kvmsmall-base?arch=x86_64&distro=opensuse-leap-15.3 opensuse kernel-kvmsmall-base < 4.12.14-197.105.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/opensuse/kernel-default-man?arch=s390x&distro=opensuse-leap-15.3 opensuse kernel-default-man < 4.12.14-197.105.1 opensuse-leap-15.3 s390x
Affected pkg:rpm/opensuse/kernel-debug-base?arch=x86_64&distro=opensuse-leap-15.3 opensuse kernel-debug-base < 4.12.14-197.105.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/opensuse/kernel-debug-base?arch=ppc64le&distro=opensuse-leap-15.3 opensuse kernel-debug-base < 4.12.14-197.105.1 opensuse-leap-15.3 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...