[SUSE-SU-2021:1624-1] Security update for the Linux Kernel

Severity Important
Affected Packages 29
CVEs 35

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).
  • CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
  • CVE-2021-29155: Fixed an issue within kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations (bnc#1184942).
  • CVE-2020-36310: Fixed an issue in arch/x86/kvm/svm/svm.c that allowed a set_memory_region_test infinite loop for certain nested page faults (bnc#1184512).
  • CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583).
  • CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).
  • CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).
  • CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).
  • CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).
  • CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).
  • CVE-2020-36311: Fixed an issue in arch/x86/kvm/svm/sev.c that allowed attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions) (bnc#1184511).
  • CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).
  • CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211).
  • CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).
  • CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).
  • CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).
  • CVE-2021-28964: Fixed a race condition in fs/btrfs/ctree.c that could have caused a denial of service because of a lack of locking on an extent buffer before a cloning operation (bnc#1184193).
  • CVE-2021-3444: Fixed the bpf verifier as it did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution (bnc#1184170).
  • CVE-2021-28971: Fixed a potential local denial of service in intel_pmu_drain_pebs_nhm where userspace applications can cause a system crash because the PEBS status in a PEBS record is mishandled (bnc#1184196).
  • CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
  • CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).
  • CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).
  • CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198).
  • CVE-2021-29647: Fixed an issue in kernel qrtr_recvmsg in net/qrtr/qrtr.c that allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bnc#1184192).
  • CVE-2020-27171: Fixed an issue in kernel/bpf/verifier.c that had an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bnc#1183686, bnc#1183775).
  • CVE-2020-27170: Fixed an issue in kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. This affects pointer types that do not define a ptr_limit (bnc#1183686 bnc#1183775).
  • CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).
  • CVE-2020-35519: Update patch reference for x25 fix (bsc#1183696).
  • CVE-2021-3428: Fixed ext4 integer overflow in ext4_es_cache_extent (bsc#1173485, bsc#1183509).
  • CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).
  • CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069).
  • CVE-2020-27815: Fixed jfs array index bounds check in dbAdjTree (bsc#1179454).
  • CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).
  • CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716).
  • CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).

The following non-security bugs were fixed:

  • Revert 'rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514)' This turned out to be a bad idea: the kernel-$flavor-devel package must be usable without kernel-$flavor, e.g. at the build of a KMP. And this change brought superfluous installation of kernel-preempt when a system had kernel-syms (bsc#1185113).
  • Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
  • bfq: Fix kABI for update internal depth state when queue depth changes (bsc#1172455).
  • bfq: update internal depth state when queue depth changes (bsc#1172455).
  • bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
  • bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
  • handle also the opposite type of race condition
  • ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
  • ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
  • ibmvnic: store valid MAC address (bsc#1182011).
  • macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672).
  • nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
  • post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
  • rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
  • rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
  • rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
  • xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022, XSA-367).
Package Affected Version
pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=1 < 4.12.14-197.89.3
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-197.89.2
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-197.89.2
ID
SUSE-SU-2021:1624-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2021/suse-su-20211624-1/
Published
2021-05-18T12:15:01
(3 years ago)
Modified
2021-05-18T12:15:01
(3 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1624-1.json
Suse URL for SUSE-SU-2021:1624-1 https://www.suse.com/support/update/announcement/2021/suse-su-20211624-1/
Suse E-Mail link for SUSE-SU-2021:1624-1 https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html
Bugzilla SUSE Bug 1047233 https://bugzilla.suse.com/1047233
Bugzilla SUSE Bug 1172455 https://bugzilla.suse.com/1172455
Bugzilla SUSE Bug 1173485 https://bugzilla.suse.com/1173485
Bugzilla SUSE Bug 1176720 https://bugzilla.suse.com/1176720
Bugzilla SUSE Bug 1177411 https://bugzilla.suse.com/1177411
Bugzilla SUSE Bug 1178181 https://bugzilla.suse.com/1178181
Bugzilla SUSE Bug 1179454 https://bugzilla.suse.com/1179454
Bugzilla SUSE Bug 1180197 https://bugzilla.suse.com/1180197
Bugzilla SUSE Bug 1181960 https://bugzilla.suse.com/1181960
Bugzilla SUSE Bug 1182011 https://bugzilla.suse.com/1182011
Bugzilla SUSE Bug 1182672 https://bugzilla.suse.com/1182672
Bugzilla SUSE Bug 1182715 https://bugzilla.suse.com/1182715
Bugzilla SUSE Bug 1182716 https://bugzilla.suse.com/1182716
Bugzilla SUSE Bug 1182717 https://bugzilla.suse.com/1182717
Bugzilla SUSE Bug 1183022 https://bugzilla.suse.com/1183022
Bugzilla SUSE Bug 1183063 https://bugzilla.suse.com/1183063
Bugzilla SUSE Bug 1183069 https://bugzilla.suse.com/1183069
Bugzilla SUSE Bug 1183509 https://bugzilla.suse.com/1183509
Bugzilla SUSE Bug 1183593 https://bugzilla.suse.com/1183593
Bugzilla SUSE Bug 1183646 https://bugzilla.suse.com/1183646
Bugzilla SUSE Bug 1183686 https://bugzilla.suse.com/1183686
Bugzilla SUSE Bug 1183696 https://bugzilla.suse.com/1183696
Bugzilla SUSE Bug 1183775 https://bugzilla.suse.com/1183775
Bugzilla SUSE Bug 1184120 https://bugzilla.suse.com/1184120
Bugzilla SUSE Bug 1184167 https://bugzilla.suse.com/1184167
Bugzilla SUSE Bug 1184168 https://bugzilla.suse.com/1184168
Bugzilla SUSE Bug 1184170 https://bugzilla.suse.com/1184170
Bugzilla SUSE Bug 1184192 https://bugzilla.suse.com/1184192
Bugzilla SUSE Bug 1184193 https://bugzilla.suse.com/1184193
Bugzilla SUSE Bug 1184194 https://bugzilla.suse.com/1184194
Bugzilla SUSE Bug 1184196 https://bugzilla.suse.com/1184196
Bugzilla SUSE Bug 1184198 https://bugzilla.suse.com/1184198
Bugzilla SUSE Bug 1184208 https://bugzilla.suse.com/1184208
Bugzilla SUSE Bug 1184211 https://bugzilla.suse.com/1184211
Bugzilla SUSE Bug 1184388 https://bugzilla.suse.com/1184388
Bugzilla SUSE Bug 1184391 https://bugzilla.suse.com/1184391
Bugzilla SUSE Bug 1184393 https://bugzilla.suse.com/1184393
Bugzilla SUSE Bug 1184397 https://bugzilla.suse.com/1184397
Bugzilla SUSE Bug 1184509 https://bugzilla.suse.com/1184509
Bugzilla SUSE Bug 1184511 https://bugzilla.suse.com/1184511
Bugzilla SUSE Bug 1184512 https://bugzilla.suse.com/1184512
Bugzilla SUSE Bug 1184514 https://bugzilla.suse.com/1184514
Bugzilla SUSE Bug 1184583 https://bugzilla.suse.com/1184583
Bugzilla SUSE Bug 1184650 https://bugzilla.suse.com/1184650
Bugzilla SUSE Bug 1184942 https://bugzilla.suse.com/1184942
Bugzilla SUSE Bug 1185113 https://bugzilla.suse.com/1185113
Bugzilla SUSE Bug 1185244 https://bugzilla.suse.com/1185244
CVE SUSE CVE CVE-2020-0433 page https://www.suse.com/security/cve/CVE-2020-0433/
CVE SUSE CVE CVE-2020-25670 page https://www.suse.com/security/cve/CVE-2020-25670/
CVE SUSE CVE CVE-2020-25671 page https://www.suse.com/security/cve/CVE-2020-25671/
CVE SUSE CVE CVE-2020-25672 page https://www.suse.com/security/cve/CVE-2020-25672/
CVE SUSE CVE CVE-2020-25673 page https://www.suse.com/security/cve/CVE-2020-25673/
CVE SUSE CVE CVE-2020-27170 page https://www.suse.com/security/cve/CVE-2020-27170/
CVE SUSE CVE CVE-2020-27171 page https://www.suse.com/security/cve/CVE-2020-27171/
CVE SUSE CVE CVE-2020-27673 page https://www.suse.com/security/cve/CVE-2020-27673/
CVE SUSE CVE CVE-2020-27815 page https://www.suse.com/security/cve/CVE-2020-27815/
CVE SUSE CVE CVE-2020-35519 page https://www.suse.com/security/cve/CVE-2020-35519/
CVE SUSE CVE CVE-2020-36310 page https://www.suse.com/security/cve/CVE-2020-36310/
CVE SUSE CVE CVE-2020-36311 page https://www.suse.com/security/cve/CVE-2020-36311/
CVE SUSE CVE CVE-2020-36312 page https://www.suse.com/security/cve/CVE-2020-36312/
CVE SUSE CVE CVE-2020-36322 page https://www.suse.com/security/cve/CVE-2020-36322/
CVE SUSE CVE CVE-2021-20219 page https://www.suse.com/security/cve/CVE-2021-20219/
CVE SUSE CVE CVE-2021-27363 page https://www.suse.com/security/cve/CVE-2021-27363/
CVE SUSE CVE CVE-2021-27364 page https://www.suse.com/security/cve/CVE-2021-27364/
CVE SUSE CVE CVE-2021-27365 page https://www.suse.com/security/cve/CVE-2021-27365/
CVE SUSE CVE CVE-2021-28038 page https://www.suse.com/security/cve/CVE-2021-28038/
CVE SUSE CVE CVE-2021-28660 page https://www.suse.com/security/cve/CVE-2021-28660/
CVE SUSE CVE CVE-2021-28688 page https://www.suse.com/security/cve/CVE-2021-28688/
CVE SUSE CVE CVE-2021-28950 page https://www.suse.com/security/cve/CVE-2021-28950/
CVE SUSE CVE CVE-2021-28964 page https://www.suse.com/security/cve/CVE-2021-28964/
CVE SUSE CVE CVE-2021-28971 page https://www.suse.com/security/cve/CVE-2021-28971/
CVE SUSE CVE CVE-2021-28972 page https://www.suse.com/security/cve/CVE-2021-28972/
CVE SUSE CVE CVE-2021-29154 page https://www.suse.com/security/cve/CVE-2021-29154/
CVE SUSE CVE CVE-2021-29155 page https://www.suse.com/security/cve/CVE-2021-29155/
CVE SUSE CVE CVE-2021-29264 page https://www.suse.com/security/cve/CVE-2021-29264/
CVE SUSE CVE CVE-2021-29265 page https://www.suse.com/security/cve/CVE-2021-29265/
CVE SUSE CVE CVE-2021-29647 page https://www.suse.com/security/cve/CVE-2021-29647/
CVE SUSE CVE CVE-2021-29650 page https://www.suse.com/security/cve/CVE-2021-29650/
CVE SUSE CVE CVE-2021-30002 page https://www.suse.com/security/cve/CVE-2021-30002/
CVE SUSE CVE CVE-2021-3428 page https://www.suse.com/security/cve/CVE-2021-3428/
CVE SUSE CVE CVE-2021-3444 page https://www.suse.com/security/cve/CVE-2021-3444/
CVE SUSE CVE CVE-2021-3483 page https://www.suse.com/security/cve/CVE-2021-3483/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=1 suse reiserfs-kmp-default < 4.12.14-197.89.2 sles-15 x86_64
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=1 suse reiserfs-kmp-default < 4.12.14-197.89.2 sles-15 s390x
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=1 suse reiserfs-kmp-default < 4.12.14-197.89.2 sles-15 ppc64le
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=1 suse reiserfs-kmp-default < 4.12.14-197.89.2 sles-15 aarch64
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=1 suse kernel-syms < 4.12.14-197.89.2 sles-15 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=1 suse kernel-syms < 4.12.14-197.89.2 sles-15 s390x
Affected pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=1 suse kernel-syms < 4.12.14-197.89.2 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=1 suse kernel-syms < 4.12.14-197.89.2 sles-15 aarch64
Affected pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=1 suse kernel-source < 4.12.14-197.89.2 sles-15 noarch
Affected pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=1 suse kernel-obs-build < 4.12.14-197.89.2 sles-15 x86_64
Affected pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=1 suse kernel-obs-build < 4.12.14-197.89.2 sles-15 s390x
Affected pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=1 suse kernel-obs-build < 4.12.14-197.89.2 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=1 suse kernel-obs-build < 4.12.14-197.89.2 sles-15 aarch64
Affected pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=1 suse kernel-macros < 4.12.14-197.89.2 sles-15 noarch
Affected pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=1 suse kernel-docs < 4.12.14-197.89.3 sles-15 noarch
Affected pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=1 suse kernel-devel < 4.12.14-197.89.2 sles-15 noarch
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=1 suse kernel-default < 4.12.14-197.89.2 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=1 suse kernel-default < 4.12.14-197.89.2 sles-15 s390x
Affected pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=1 suse kernel-default < 4.12.14-197.89.2 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=1 suse kernel-default < 4.12.14-197.89.2 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-15&sp=1 suse kernel-default-man < 4.12.14-197.89.2 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=1 suse kernel-default-devel < 4.12.14-197.89.2 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=1 suse kernel-default-devel < 4.12.14-197.89.2 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=1 suse kernel-default-devel < 4.12.14-197.89.2 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=1 suse kernel-default-devel < 4.12.14-197.89.2 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=1 suse kernel-default-base < 4.12.14-197.89.2 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=1 suse kernel-default-base < 4.12.14-197.89.2 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=1 suse kernel-default-base < 4.12.14-197.89.2 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=1 suse kernel-default-base < 4.12.14-197.89.2 sles-15 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...