SUSE: 2020:1663-1 important: the Linux Kernel
Summary
The SUSE Linux Enterprise 15 kernel was updated receive various security
and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than
the one which called it. This attack is known as Special Register Buffer
Data Sampling (SRBDS) or "CrossTalk" (bsc#1154824).
- CVE-2020-9383: Fixed an out-of-bounds read due to improper error
condition check of FDC index (bsc#1165111).
- CVE-2020-8992: Fixed an issue which could have allowed attackers to
cause a soft lockup via a crafted journal size (bsc#1164069).
- CVE-2020-8834: Fixed a stack corruption which could have lead to kernel
panic (bsc#1168276).
- CVE-2020-8649: Fixed a use-after-free in the vgacon_invert_region
function in drivers/video/console/vgacon.c (bsc#1162931).
- CVE-2020-8648: Fixed a use-after-free in the n_tty_receive_buf_common
function in drivers/tty/n_tty.c (bsc#1162928).
- CVE-2020-8647: Fixed a use-after-free in the vc_do_resize function in
drivers/tty/vt/vt.c (bsc#1162929).
- CVE-2020-8428: Fixed a use-after-free which could have allowed local
users to cause a denial of service (bsc#1162109).
- CVE-2020-7053: Fixed a use-after-free in the i915_ppgtt_close function
in drivers/gpu/drm/i915/i915_gem_gtt.c (bsc#1160966).
- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may
trick the L0 hypervisor into accessing sensitive L1 resources
(bsc#1163971).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store
in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to
cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one
(bsc#1171983).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release
calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to
trigger a sync of excessive duration via an XFS v5 image with crafted
metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have
allowed a remote AP to trigger a heap-based buffer overflow
(bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have
allowed local users to gain privileges or cause a denial of service
(bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to
hold an incorrect lock during the ioctl operation and trigger a race
condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a
reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have
allowed local users to cause a denial of service (panic) by corrupting a
mountpoint reference counter (bsc#1171098).
- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S
did not have save/restore functionality for PNV_POWERSAVE_AMR,
PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).
- CVE-2020-11609: Fixed a null pointer dereference due to improper
handling of descriptors (bsc#1168854).
- CVE-2020-11608: Fixed a null pointer dereferences via a crafted USB
(bsc#1168829).
- CVE-2020-11494: Fixed an issue which could have allowed attackers to
read uninitialized can_frame data (bsc#1168424).
- CVE-2020-10942: Fixed a kernel stack corruption via crafted system calls
(bsc#1167629).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap
could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook
where it was assumed that an skb would only contain a single netlink
message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to
uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()
(bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem
which could have allowed a remote network user to crash the kernel
resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev
(bsc#1170056).
- CVE-2019-9458: Fixed a use after free due to a race condition which
could have led to privilege escalation of privilege (bsc#1168295).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a
video driver. This could lead to local information disclosure with
System execution privileges needed (bsc#1170345).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a
system crash (bsc#1120386).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could
have resulted in a denial of service (bsc#1172453).
- CVE-2019-20810: Fixed a memory leak in due to not calling of
snd_card_free (bsc#1172458).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in
net/dccp/feat.c, which could have caused denial of service (bsc#1159908).
- CVE-2019-20095: Fixed an improper error-handling cases that did not free
allocated hostcmd memory which was causing memory leak (bsc#1159909).
- CVE-2019-20054: Fixed a null pointer dereference in drop_sysctl_table()
in fs/proc/proc_sysctl.c, related to put_links (bsc#1159910).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() which could have
caused denial of service (bsc#1159841).
- CVE-2019-19965: Fixed a null pointer dereference, due to mishandling of
port disconnection during discovery (bsc#1159911).
- CVE-2019-19770: Fixed a use-after-free in the debugfs_remove function
(bsc#1159198).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function
in kernel/trace/blktrace.c (bsc#1159285).
- CVE-2019-19462: Fixed an issue which could have allowed local user to
cause denial of service (bsc#1158265).
- CVE-2019-19447: Fixed a user after free via a crafted ext4 filesystem
image (bsc#1158819).
- CVE-2019-19319: Fixed a user after free when a large old_size value is
used in a memset call (bsc#1158021).
- CVE-2019-19318: Fixed a use after free via a crafted btrfs image
(bsc#1158026).
- CVE-2019-19054: Fixed a memory leak in the cx23888_ir_probe() which
could have allowed attackers to cause a denial of service (bsc#1161518).
- CVE-2019-19045: Fixed a memory leak in which could have allowed
attackers to cause a denial of service (bsc#1161522).
- CVE-2019-19036: Fixed a null pointer dereference in btrfs_root_node
(bsc#1157692).
- CVE-2019-16994: Fixed a memory leak which might have caused denial of
service (bsc#1161523).
- CVE-2019-14897: Fixed a stack overflow in Marvell Wifi Driver
(bsc#1157155).
- CVE-2019-14896: Fixed a heap overflow in Marvell Wifi Driver
(bsc#1157157).
- CVE-2019-14615: Fixed an improper control flow in certain data
structures which could have led to information disclosure (bsc#1160195).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace
(bsc#1089895).
The following non-security bugs were fixed:
- 6pack,mkiss: fix possible deadlock (bsc#1051510).
- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).
- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data()
(bsc#1051510).
- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion()
(bsc#1051510).
- af_packet: set defaule value for tmo (bsc#1051510).
- ALSA: control: remove useless assignment in .info callback of PCM chmap
element (git-fixes).
- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).
- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s
(git-fixes).
- ALSA: hda/analog - Minor optimization for SPDIF mux connections
(git-fixes).
- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).
- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).
- ALSA: hda/ca0132 - Keep power on during processing DSP response
(git-fixes).
- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).
- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).
- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).
- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).
- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code
(bsc#1051510).
- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).
- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).
- ALSA: sh: Fix compile warning wrt const (git-fixes).
- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).
- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).
- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).
- arm64: Revert support for execute-only user mappings (bsc#1160218).
- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).
- ASoC: cs4349: Use PM ops 'cs4349_runtime_pm' (bsc#1051510).
- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report
(bsc#1051510).
- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1
(bsc#1051510).
- ASoC: wm8962: fix lambda value (git-fixes).
- ath10k: fix fw crash by moving chip reset after napi disabled
(bsc#1051510).
- ath9k: fix storage endpoint lookup (git-fixes).
- a typo in %kernel_base_conflicts macro name
- batman-adv: Fix DAT candidate selection on little endian systems
(bsc#1051510).
- bcma: remove set but not used variable 'sizel' (git-fixes).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- bonding: fix active-backup transition after link failure (git-fixes).
- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).
- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).
- brcmfmac: fix interface sanity check (git-fixes).
- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).
- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).
- btrfs: abort transaction after failed inode updates in create_subvol
(bsc#1161936).
- btrfs: add missing extents release on file extent cluster relocation
error (bsc#1159483).
- btrfs: avoid fallback to transaction commit during fsync of files with
holes (bsc#1159569).
- btrfs: dev-replace: remove warning for unknown return codes when
finished (dependency for bsc#1162067).
- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).
- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).
- btrfs: fix block group remaining RO forever after error during device
replace (bsc#1160442).
- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).
- btrfs: fix infinite loop during nocow writeback due to race
(bsc#1160804).
- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).
- btrfs: fix missing data checksums after replaying a log tree
(bsc#1161931).
- btrfs: fix negative subv_writers counter and data space leak after
buffered write (bsc#1160802).
- btrfs: fix removal logic of the tree mod log that leads to
use-after-free issues (bsc#1160803).
- btrfs: fix selftests failure due to uninitialized i_mode in test inodes
(Fix for dependency of bsc#1157692).
- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).
- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).
- btrfs: inode: Verify inode mode to avoid NULL pointer dereference
(dependency for bsc#1157692).
- btrfs: make tree checker detect checksum items with overlapping ranges
(bsc#1161931).
- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it
(dependency for bsc#1157692).
- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).
- btrfs: scrub: Require mandatory block group RO for dev-replace
(bsc#1162067).
- btrfs: send, skip backreference walking for extents with many references
(bsc#1162139).
- btrfs: skip log replay on orphaned roots (bsc#1161935).
- btrfs: tree-checker: Check chunk item at tree block read time
(dependency for bsc#1157692).
- btrfs: tree-checker: Check level for leaves and nodes (dependency for
bsc#1157692).
- btrfs: tree-checker: Enhance chunk checker to validate chunk profile
(dependency for bsc#1157692).
- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency
of bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency
for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_block_group_item
(dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency
for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency
for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency
for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_extent_data_item
(dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency
for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for
bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency
for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for
bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for
bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for
bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency
for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for
bsc#1157692).
- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN
instead of EIO (dependency for bsc#1157692).
- btrfs: tree-checker: Make chunk item checker messages more readable
(dependency for bsc#1157692).
- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).
- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).
- btrfs: volumes: Use more straightforward way to calculate map length
(bsc#1151910).
- can: can_dropped_invalid_skb(): ensure an initialized headroom in
outgoing CAN sk_buffs (bsc#1051510).
- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting
(bsc#1051510).
- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from
polling to irq mode (bsc#1051510).
- can, slip: Protect tty->disc_data in write_wakeup and close with RCU
(bsc#1051510).
- cfg80211: check for set_wiphy_params (bsc#1051510).
- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).
- cfg80211/mac80211: make ieee80211_send_layer2_update a public function
(bsc#1051510).
- cgroup: pids: use atomic64_t for pids->limit (bsc#1161514).
- CIFS: add support for flock (bsc#1144333).
- CIFS: Close cached root handle only if it had a lease (bsc#1144333).
- CIFS: Close open handle after interrupted close (bsc#1144333).
- CIFS: close the shared root handle on tree disconnect (bsc#1144333).
- CIFS: Do not miss cancelled OPEN responses (bsc#1144333).
- CIFS: Fix lookup of root ses in DFS referral cache (bsc#1144333).
- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd()
(bsc#1144333).
- CIFS: Fix mount options set in automount (bsc#1144333).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks
(bsc#1144333).
- CIFS: Fix potential softlockups while refreshing DFS cache (bsc#1144333).
- CIFS: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).
- CIFS: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).
- CIFS: Properly process SMB3 lease breaks (bsc#1144333).
- CIFS: remove set but not used variables 'cinode' and 'netfid'
(bsc#1144333).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).
- clk: Do not try to enable critical clocks if prepare failed
(bsc#1051510).
- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).
- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).
- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering
(bsc#1051510).
- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).
- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls
(bsc#1051510).
- clocksource/drivers/bcm2835_timer: Fix memory leak of timer
(bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/
InvariantTSC (bsc#1170621).
- copy/pasted "Recommends:" instead of "Provides:", "Obsoletes:" and
"Conflicts:
- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).
- crypto: api - Check spawn->alg under lock in crypto_drop_spawn
(bsc#1051510).
- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).
- crypto: atmel-sha - fix error handling when setting hmac key
(bsc#1051510).
- crypto: ccp - fix uninitialized list head (bsc#1051510).
- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).
- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request
(bsc#1051510).
- crypto: picoxcell - adjust the position of tasklet_init and fix missed
tasklet_kill (bsc#1051510).
- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).
- debugfs: add support for more elaborate ->d_fsdata (bsc#1159198
bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: call debugfs_real_fops() only after debugfs_file_get()
(bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: convert to debugfs_file_get() and -put() (bsc#1159198
bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: debugfs_real_fops(): drop __must_hold sparse annotation
(bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: debugfs_use_start/finish do not exist anymore (bsc#1159198).
Prerequisite for bsc#1159198.
- debugfs: defer debugfs_fsdata allocation to first usage (bsc#1159198
bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: fix debugfs_real_fops() build error (bsc#1159198 bsc#1109911).
Prerequisite for bsc#1159198.
- debugfs: implement per-file removal protection (bsc#1159198
bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: purge obsolete SRCU based removal protection (bsc#1159198
bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: simplify __debugfs_remove_file() (bsc#1159198). Prerequisite
for bsc#1159198.
- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).
- dmaengine: coh901318: Remove unused variable (bsc#1051510).
- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).
- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).
- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup
(bsc#1159955 ltc#182993).
- drivers/base/memory.c: do not access uninitialized memmaps in
soft_offline_page_store() (bsc#1051510).
- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic
(bsc#1170617).
- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr
(bsc#1170617).
- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- drivers: hv: vmus: Fix the check for return value from kmsg get dump
buffer (bsc#1170617).
- drm/amdgpu: add function parameter description in 'amdgpu_gart_bind'
(bsc#1051510).
- drm/amdgpu: remove 4 set but not used variable in
amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).
- drm/amdgpu: remove always false comparison in
'amdgpu_atombios_i2c_process_i2c_ch' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'amdgpu_connector'
(bsc#1051510).
- drm/amdgpu: remove set but not used variable 'dig' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'dig_connector'
(bsc#1051510).
- drm/amdgpu: remove set but not used variable 'mc_shared_chmap'
(bsc#1051510).
- drm/amdgpu: remove set but not used variable 'mc_shared_chmap' from
'gfx_v6_0.c' and 'gfx_v7_0.c' (bsc#1051510).
- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).
- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).
- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).
- drm/i810: Prevent underflow in ioctl (bsc#1114279)
- drm/i915: Add missing include file
References
#1050244 #1051510 #1051858 #1058115 #1061840
#1065600 #1065729 #1071995 #1085030 #1086301
#1086313 #1086314 #1089895 #1109911 #1114279
#1118338 #1120386 #1134973 #1143959 #1144333
#1151910 #1151927 #1153917 #1154243 #1154824
#1156286 #1157155 #1157157 #1157692 #1158013
#1158021 #1158026 #1158265 #1158819 #1159028
#1159198 #1159271 #1159285 #1159394 #1159483
#1159484 #1159569 #1159588 #1159841 #1159908
#1159909 #1159910 #1159911 #1159955 #1160195
#1160210 #1160211 #1160218 #1160433 #1160442
#1160476 #1160560 #1160755 #1160756 #1160784
#1160787 #1160802 #1160803 #1160804 #1160917
#1160966 #1161087 #1161514 #1161518 #1161522
#1161523 #1161549 #1161552 #1161555 #1161674
#1161931 #1161933 #1161934 #1161935 #1161936
#1161937 #1161951 #1162067 #1162109 #1162139
#1162928 #1162929 #1162931 #1163971 #1164051
#1164069 #1164078 #1164705 #1164712 #1164727
#1164728 #1164729 #1164730 #1164731 #1164732
#1164733 #1164734 #1164735 #1164871 #1165111
#1165741 #1165873 #1165881 #1165984 #1165985
#1166969 #1167421 #1167423 #1167629 #1168075
#1168276 #1168295 #1168424 #1168670 #1168829
#1168854 #1169390 #1169514 #1169625 #1170056
#1170345 #1170617 #1170618 #1170621 #1170778
#1170901 #1171098 #1171189 #1171191 #1171195
#1171202 #1171205 #1171217 #1171218 #1171219
#1171220 #1171689 #1171982 #1171983 #1172221
#1172317 #1172453 #1172458
Cross- CVE-2018-1000199 CVE-2019-14615 CVE-2019-14896
CVE-2019-14897 CVE-2019-16994 CVE-2019-19036
CVE-2019-19045 CVE-2019-19054 CVE-2019-19318
CVE-2019-19319 CVE-2019-19447 CVE-2019-19462
CVE-2019-19768 CVE-2019-19770 CVE-2019-19965
CVE-2019-19966 CVE-2019-20054 CVE-2019-20095
CVE-2019-20096 CVE-2019-20810 CVE-2019-20812
CVE-2019-3701 CVE-2019-9455 CVE-2019-9458
CVE-2020-0543 CVE-2020-10690 CVE-2020-10711
CVE-2020-10720 CVE-2020-10732 CVE-2020-10751
CVE-2020-10757 CVE-2020-10942 CVE-2020-11494
CVE-2020-11608 CVE-2020-11609 CVE-2020-11669
CVE-2020-12114 CVE-2020-12464 CVE-2020-12652
CVE-2020-12653 CVE-2020-12654 CVE-2020-12655
CVE-2020-12656 CVE-2020-12657 CVE-2020-12769
CVE-2020-13143 CVE-2020-2732 CVE-2020-7053
CVE-2020-8428 CVE-2020-8647 CVE-2020-8648
CVE-2020-8649 CVE-2020-8834 CVE-2020-8992
CVE-2020-9383
Affected Products:
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Availability 15
https://www.suse.com/security/cve/CVE-2018-1000199.html
https://www.suse.com/security/cve/CVE-2019-14615.html
https://www.suse.com/security/cve/CVE-2019-14896.html
https://www.suse.com/security/cve/CVE-2019-14897.html
https://www.suse.com/security/cve/CVE-2019-16994.html
https://www.suse.com/security/cve/CVE-2019-19036.html
https://www.suse.com/security/cve/CVE-2019-19045.html
https://www.suse.com/security/cve/CVE-2019-19054.html
https://www.suse.com/security/cve/CVE-2019-19318.html
https://www.suse.com/security/cve/CVE-2019-19319.html
https://www.suse.com/security/cve/CVE-2019-19447.html
https://www.suse.com/security/cve/CVE-2019-19462.html
https://www.suse.com/security/cve/CVE-2019-19768.html
https://www.suse.com/security/cve/CVE-2019-19770.html
https://www.suse.com/security/cve/CVE-2019-19965.html
https://www.suse.com/security/cve/CVE-2019-19966.html
https://www.suse.com/security/cve/CVE-2019-20054.html
https://www.suse.com/security/cve/CVE-2019-20095.html
https://www.suse.com/security/cve/CVE-2019-20096.html
https://www.suse.com/security/cve/CVE-2019-20810.html
https://www.suse.com/security/cve/CVE-2019-20812.html
https://www.suse.com/security/cve/CVE-2019-3701.html
https://www.suse.com/security/cve/CVE-2019-9455.html
https://www.suse.com/security/cve/CVE-2019-9458.html
https://www.suse.com/security/cve/CVE-2020-0543.html
https://www.suse.com/security/cve/CVE-2020-10690.html
https://www.suse.com/security/cve/CVE-2020-10711.html
https://www.suse.com/security/cve/CVE-2020-10720.html
https://www.suse.com/security/cve/CVE-2020-10732.html
https://www.suse.com/security/cve/CVE-2020-10751.html
https://www.suse.com/security/cve/CVE-2020-10757.html
https://www.suse.com/security/cve/CVE-2020-10942.html
https://www.suse.com/security/cve/CVE-2020-11494.html
https://www.suse.com/security/cve/CVE-2020-11608.html
https://www.suse.com/security/cve/CVE-2020-11609.html
https://www.suse.com/security/cve/CVE-2020-11669.html
https://www.suse.com/security/cve/CVE-2020-12114.html
https://www.suse.com/security/cve/CVE-2020-12464.html
https://www.suse.com/security/cve/CVE-2020-12652.html
https://www.suse.com/security/cve/CVE-2020-12653.html
https://www.suse.com/security/cve/CVE-2020-12654.html
https://www.suse.com/security/cve/CVE-2020-12655.html
https://www.suse.com/security/cve/CVE-2020-12656.html
https://www.suse.com/security/cve/CVE-2020-12657.html
https://www.suse.com/security/cve/CVE-2020-12769.html
https://www.suse.com/security/cve/CVE-2020-13143.html
https://www.suse.com/security/cve/CVE-2020-2732.html
https://www.suse.com/security/cve/CVE-2020-7053.html
https://www.suse.com/security/cve/CVE-2020-8428.html
https://www.suse.com/security/cve/CVE-2020-8647.html
https://www.suse.com/security/cve/CVE-2020-8648.html
https://www.suse.com/security/cve/CVE-2020-8649.html
https://www.suse.com/security/cve/CVE-2020-8834.html
https://www.suse.com/security/cve/CVE-2020-8992.html
https://www.suse.com/security/cve/CVE-2020-9383.html
https://bugzilla.suse.com/1050244
https://bugzilla.suse.com/1051510
https://bugzilla.suse.com/1051858
https://bugzilla.suse.com/1058115
https://bugzilla.suse.com/1061840
https://bugzilla.suse.com/1065600
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1085030
https://bugzilla.suse.com/1086301
https://bugzilla.suse.com/1086313
https://bugzilla.suse.com/1086314
https://bugzilla.suse.com/1089895
https://bugzilla.suse.com/1109911
https://bugzilla.suse.com/1114279
https://bugzilla.suse.com/1118338
https://bugzilla.suse.com/1120386
https://bugzilla.suse.com/1134973
https://bugzilla.suse.com/1143959
https://bugzilla.suse.com/1144333
https://bugzilla.suse.com/1151910
https://bugzilla.suse.com/1151927
https://bugzilla.suse.com/1153917
https://bugzilla.suse.com/1154243
https://bugzilla.suse.com/1154824
https://bugzilla.suse.com/1156286
https://bugzilla.suse.com/1157155
https://bugzilla.suse.com/1157157
https://bugzilla.suse.com/1157692
https://bugzilla.suse.com/1158013
https://bugzilla.suse.com/1158021
https://bugzilla.suse.com/1158026
https://bugzilla.suse.com/1158265
https://bugzilla.suse.com/1158819
https://bugzilla.suse.com/1159028
https://bugzilla.suse.com/1159198
https://bugzilla.suse.com/1159271
https://bugzilla.suse.com/1159285
https://bugzilla.suse.com/1159394
https://bugzilla.suse.com/1159483
https://bugzilla.suse.com/1159484
https://bugzilla.suse.com/1159569
https://bugzilla.suse.com/1159588
https://bugzilla.suse.com/1159841
https://bugzilla.suse.com/1159908
https://bugzilla.suse.com/1159909
https://bugzilla.suse.com/1159910
https://bugzilla.suse.com/1159911
https://bugzilla.suse.com/1159955
https://bugzilla.suse.com/1160195
https://bugzilla.suse.com/1160210
https://bugzilla.suse.com/1160211
https://bugzilla.suse.com/1160218
https://bugzilla.suse.com/1160433
https://bugzilla.suse.com/1160442
https://bugzilla.suse.com/1160476
https://bugzilla.suse.com/1160560
https://bugzilla.suse.com/1160755
https://bugzilla.suse.com/1160756
https://bugzilla.suse.com/1160784
https://bugzilla.suse.com/1160787
https://bugzilla.suse.com/1160802
https://bugzilla.suse.com/1160803
https://bugzilla.suse.com/1160804
https://bugzilla.suse.com/1160917
https://bugzilla.suse.com/1160966
https://bugzilla.suse.com/1161087
https://bugzilla.suse.com/1161514
https://bugzilla.suse.com/1161518
https://bugzilla.suse.com/1161522
https://bugzilla.suse.com/1161523
https://bugzilla.suse.com/1161549
https://bugzilla.suse.com/1161552
https://bugzilla.suse.com/1161555
https://bugzilla.suse.com/1161674
https://bugzilla.suse.com/1161931
https://bugzilla.suse.com/1161933
https://bugzilla.suse.com/1161934
https://bugzilla.suse.com/1161935
https://bugzilla.suse.com/1161936
https://bugzilla.suse.com/1161937
https://bugzilla.suse.com/1161951
https://bugzilla.suse.com/1162067
https://bugzilla.suse.com/1162109
https://bugzilla.suse.com/1162139
https://bugzilla.suse.com/1162928
https://bugzilla.suse.com/1162929
https://bugzilla.suse.com/1162931
https://bugzilla.suse.com/1163971
https://bugzilla.suse.com/1164051
https://bugzilla.suse.com/1164069
https://bugzilla.suse.com/1164078
https://bugzilla.suse.com/1164705
https://bugzilla.suse.com/1164712
https://bugzilla.suse.com/1164727
https://bugzilla.suse.com/1164728
https://bugzilla.suse.com/1164729
https://bugzilla.suse.com/1164730
https://bugzilla.suse.com/1164731
https://bugzilla.suse.com/1164732
https://bugzilla.suse.com/1164733
https://bugzilla.suse.com/1164734
https://bugzilla.suse.com/1164735
https://bugzilla.suse.com/1164871
https://bugzilla.suse.com/1165111
https://bugzilla.suse.com/1165741
https://bugzilla.suse.com/1165873
https://bugzilla.suse.com/1165881
https://bugzilla.suse.com/1165984
https://bugzilla.suse.com/1165985
https://bugzilla.suse.com/1166969
https://bugzilla.suse.com/1167421
https://bugzilla.suse.com/1167423
https://bugzilla.suse.com/1167629
https://bugzilla.suse.com/1168075
https://bugzilla.suse.com/1168276
https://bugzilla.suse.com/1168295
https://bugzilla.suse.com/1168424
https://bugzilla.suse.com/1168670
https://bugzilla.suse.com/1168829
https://bugzilla.suse.com/1168854
https://bugzilla.suse.com/1169390
https://bugzilla.suse.com/1169514
https://bugzilla.suse.com/1169625
https://bugzilla.suse.com/1170056
https://bugzilla.suse.com/1170345
https://bugzilla.suse.com/1170617
https://bugzilla.suse.com/1170618
https://bugzilla.suse.com/1170621
https://bugzilla.suse.com/1170778
https://bugzilla.suse.com/1170901
https://bugzilla.suse.com/1171098
https://bugzilla.suse.com/1171189
https://bugzilla.suse.com/1171191
https://bugzilla.suse.com/1171195
https://bugzilla.suse.com/1171202
https://bugzilla.suse.com/1171205
https://bugzilla.suse.com/1171217
https://bugzilla.suse.com/1171218
https://bugzilla.suse.com/1171219
https://bugzilla.suse.com/1171220
https://bugzilla.suse.com/1171689
https://bugzilla.suse.com/1171982
https://bugzilla.suse.com/1171983
https://bugzilla.suse.com/1172221
https://bugzilla.suse.com/1172317
https://bugzilla.suse.com/1172453
https://bugzilla.suse.com/1172458