{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.111.1","kernel-bigmem-base":"3.0.101-108.111.1","kernel-bigmem-devel":"3.0.101-108.111.1","kernel-default":"3.0.101-108.111.1","kernel-default-base":"3.0.101-108.111.1","kernel-default-devel":"3.0.101-108.111.1","kernel-default-man":"3.0.101-108.111.1","kernel-ec2":"3.0.101-108.111.1","kernel-ec2-base":"3.0.101-108.111.1","kernel-ec2-devel":"3.0.101-108.111.1","kernel-pae":"3.0.101-108.111.1","kernel-pae-base":"3.0.101-108.111.1","kernel-pae-devel":"3.0.101-108.111.1","kernel-ppc64":"3.0.101-108.111.1","kernel-ppc64-base":"3.0.101-108.111.1","kernel-ppc64-devel":"3.0.101-108.111.1","kernel-source":"3.0.101-108.111.1","kernel-syms":"3.0.101-108.111.1","kernel-trace":"3.0.101-108.111.1","kernel-trace-base":"3.0.101-108.111.1","kernel-trace-devel":"3.0.101-108.111.1","kernel-xen":"3.0.101-108.111.1","kernel-xen-base":"3.0.101-108.111.1","kernel-xen-devel":"3.0.101-108.111.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kernel-bigmem","purl":"pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.111.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.111.1","kernel-bigmem-base":"3.0.101-108.111.1","kernel-bigmem-devel":"3.0.101-108.111.1","kernel-default":"3.0.101-108.111.1","kernel-default-base":"3.0.101-108.111.1","kernel-default-devel":"3.0.101-108.111.1","kernel-default-man":"3.0.101-108.111.1","kernel-ec2":"3.0.101-108.111.1","kernel-ec2-base":"3.0.101-108.111.1","kernel-ec2-devel":"3.0.101-108.111.1","kernel-pae":"3.0.101-108.111.1","kernel-pae-base":"3.0.101-108.111.1","kernel-pae-devel":"3.0.101-108.111.1","kernel-ppc64":"3.0.101-108.111.1","kernel-ppc64-base":"3.0.101-108.111.1","kernel-ppc64-devel":"3.0.101-108.111.1","kernel-source":"3.0.101-108.111.1","kernel-syms":"3.0.101-108.111.1","kernel-trace":"3.0.101-108.111.1","kernel-trace-base":"3.0.101-108.111.1","kernel-trace-devel":"3.0.101-108.111.1","kernel-xen":"3.0.101-108.111.1","kernel-xen-base":"3.0.101-108.111.1","kernel-xen-devel":"3.0.101-108.111.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.111.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.111.1","kernel-bigmem-base":"3.0.101-108.111.1","kernel-bigmem-devel":"3.0.101-108.111.1","kernel-default":"3.0.101-108.111.1","kernel-default-base":"3.0.101-108.111.1","kernel-default-devel":"3.0.101-108.111.1","kernel-default-man":"3.0.101-108.111.1","kernel-ec2":"3.0.101-108.111.1","kernel-ec2-base":"3.0.101-108.111.1","kernel-ec2-devel":"3.0.101-108.111.1","kernel-pae":"3.0.101-108.111.1","kernel-pae-base":"3.0.101-108.111.1","kernel-pae-devel":"3.0.101-108.111.1","kernel-ppc64":"3.0.101-108.111.1","kernel-ppc64-base":"3.0.101-108.111.1","kernel-ppc64-devel":"3.0.101-108.111.1","kernel-source":"3.0.101-108.111.1","kernel-syms":"3.0.101-108.111.1","kernel-trace":"3.0.101-108.111.1","kernel-trace-base":"3.0.101-108.111.1","kernel-trace-devel":"3.0.101-108.111.1","kernel-xen":"3.0.101-108.111.1","kernel-xen-base":"3.0.101-108.111.1","kernel-xen-devel":"3.0.101-108.111.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kernel-ec2","purl":"pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.111.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.111.1","kernel-bigmem-base":"3.0.101-108.111.1","kernel-bigmem-devel":"3.0.101-108.111.1","kernel-default":"3.0.101-108.111.1","kernel-default-base":"3.0.101-108.111.1","kernel-default-devel":"3.0.101-108.111.1","kernel-default-man":"3.0.101-108.111.1","kernel-ec2":"3.0.101-108.111.1","kernel-ec2-base":"3.0.101-108.111.1","kernel-ec2-devel":"3.0.101-108.111.1","kernel-pae":"3.0.101-108.111.1","kernel-pae-base":"3.0.101-108.111.1","kernel-pae-devel":"3.0.101-108.111.1","kernel-ppc64":"3.0.101-108.111.1","kernel-ppc64-base":"3.0.101-108.111.1","kernel-ppc64-devel":"3.0.101-108.111.1","kernel-source":"3.0.101-108.111.1","kernel-syms":"3.0.101-108.111.1","kernel-trace":"3.0.101-108.111.1","kernel-trace-base":"3.0.101-108.111.1","kernel-trace-devel":"3.0.101-108.111.1","kernel-xen":"3.0.101-108.111.1","kernel-xen-base":"3.0.101-108.111.1","kernel-xen-devel":"3.0.101-108.111.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kernel-pae","purl":"pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.111.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.111.1","kernel-bigmem-base":"3.0.101-108.111.1","kernel-bigmem-devel":"3.0.101-108.111.1","kernel-default":"3.0.101-108.111.1","kernel-default-base":"3.0.101-108.111.1","kernel-default-devel":"3.0.101-108.111.1","kernel-default-man":"3.0.101-108.111.1","kernel-ec2":"3.0.101-108.111.1","kernel-ec2-base":"3.0.101-108.111.1","kernel-ec2-devel":"3.0.101-108.111.1","kernel-pae":"3.0.101-108.111.1","kernel-pae-base":"3.0.101-108.111.1","kernel-pae-devel":"3.0.101-108.111.1","kernel-ppc64":"3.0.101-108.111.1","kernel-ppc64-base":"3.0.101-108.111.1","kernel-ppc64-devel":"3.0.101-108.111.1","kernel-source":"3.0.101-108.111.1","kernel-syms":"3.0.101-108.111.1","kernel-trace":"3.0.101-108.111.1","kernel-trace-base":"3.0.101-108.111.1","kernel-trace-devel":"3.0.101-108.111.1","kernel-xen":"3.0.101-108.111.1","kernel-xen-base":"3.0.101-108.111.1","kernel-xen-devel":"3.0.101-108.111.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kernel-ppc64","purl":"pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.111.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.111.1","kernel-bigmem-base":"3.0.101-108.111.1","kernel-bigmem-devel":"3.0.101-108.111.1","kernel-default":"3.0.101-108.111.1","kernel-default-base":"3.0.101-108.111.1","kernel-default-devel":"3.0.101-108.111.1","kernel-default-man":"3.0.101-108.111.1","kernel-ec2":"3.0.101-108.111.1","kernel-ec2-base":"3.0.101-108.111.1","kernel-ec2-devel":"3.0.101-108.111.1","kernel-pae":"3.0.101-108.111.1","kernel-pae-base":"3.0.101-108.111.1","kernel-pae-devel":"3.0.101-108.111.1","kernel-ppc64":"3.0.101-108.111.1","kernel-ppc64-base":"3.0.101-108.111.1","kernel-ppc64-devel":"3.0.101-108.111.1","kernel-source":"3.0.101-108.111.1","kernel-syms":"3.0.101-108.111.1","kernel-trace":"3.0.101-108.111.1","kernel-trace-base":"3.0.101-108.111.1","kernel-trace-devel":"3.0.101-108.111.1","kernel-xen":"3.0.101-108.111.1","kernel-xen-base":"3.0.101-108.111.1","kernel-xen-devel":"3.0.101-108.111.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.111.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.111.1","kernel-bigmem-base":"3.0.101-108.111.1","kernel-bigmem-devel":"3.0.101-108.111.1","kernel-default":"3.0.101-108.111.1","kernel-default-base":"3.0.101-108.111.1","kernel-default-devel":"3.0.101-108.111.1","kernel-default-man":"3.0.101-108.111.1","kernel-ec2":"3.0.101-108.111.1","kernel-ec2-base":"3.0.101-108.111.1","kernel-ec2-devel":"3.0.101-108.111.1","kernel-pae":"3.0.101-108.111.1","kernel-pae-base":"3.0.101-108.111.1","kernel-pae-devel":"3.0.101-108.111.1","kernel-ppc64":"3.0.101-108.111.1","kernel-ppc64-base":"3.0.101-108.111.1","kernel-ppc64-devel":"3.0.101-108.111.1","kernel-source":"3.0.101-108.111.1","kernel-syms":"3.0.101-108.111.1","kernel-trace":"3.0.101-108.111.1","kernel-trace-base":"3.0.101-108.111.1","kernel-trace-devel":"3.0.101-108.111.1","kernel-xen":"3.0.101-108.111.1","kernel-xen-base":"3.0.101-108.111.1","kernel-xen-devel":"3.0.101-108.111.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.111.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.111.1","kernel-bigmem-base":"3.0.101-108.111.1","kernel-bigmem-devel":"3.0.101-108.111.1","kernel-default":"3.0.101-108.111.1","kernel-default-base":"3.0.101-108.111.1","kernel-default-devel":"3.0.101-108.111.1","kernel-default-man":"3.0.101-108.111.1","kernel-ec2":"3.0.101-108.111.1","kernel-ec2-base":"3.0.101-108.111.1","kernel-ec2-devel":"3.0.101-108.111.1","kernel-pae":"3.0.101-108.111.1","kernel-pae-base":"3.0.101-108.111.1","kernel-pae-devel":"3.0.101-108.111.1","kernel-ppc64":"3.0.101-108.111.1","kernel-ppc64-base":"3.0.101-108.111.1","kernel-ppc64-devel":"3.0.101-108.111.1","kernel-source":"3.0.101-108.111.1","kernel-syms":"3.0.101-108.111.1","kernel-trace":"3.0.101-108.111.1","kernel-trace-base":"3.0.101-108.111.1","kernel-trace-devel":"3.0.101-108.111.1","kernel-xen":"3.0.101-108.111.1","kernel-xen-base":"3.0.101-108.111.1","kernel-xen-devel":"3.0.101-108.111.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kernel-trace","purl":"pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.111.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.111.1","kernel-bigmem-base":"3.0.101-108.111.1","kernel-bigmem-devel":"3.0.101-108.111.1","kernel-default":"3.0.101-108.111.1","kernel-default-base":"3.0.101-108.111.1","kernel-default-devel":"3.0.101-108.111.1","kernel-default-man":"3.0.101-108.111.1","kernel-ec2":"3.0.101-108.111.1","kernel-ec2-base":"3.0.101-108.111.1","kernel-ec2-devel":"3.0.101-108.111.1","kernel-pae":"3.0.101-108.111.1","kernel-pae-base":"3.0.101-108.111.1","kernel-pae-devel":"3.0.101-108.111.1","kernel-ppc64":"3.0.101-108.111.1","kernel-ppc64-base":"3.0.101-108.111.1","kernel-ppc64-devel":"3.0.101-108.111.1","kernel-source":"3.0.101-108.111.1","kernel-syms":"3.0.101-108.111.1","kernel-trace":"3.0.101-108.111.1","kernel-trace-base":"3.0.101-108.111.1","kernel-trace-devel":"3.0.101-108.111.1","kernel-xen":"3.0.101-108.111.1","kernel-xen-base":"3.0.101-108.111.1","kernel-xen-devel":"3.0.101-108.111.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kernel-xen","purl":"pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.111.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bsc#1167629).\n- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).\n- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).\n- CVE-2020-9383: An issue was discovered set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it (bsc#1165111).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).\n- CVE-2020-11608: Fixed a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bsc#1168829).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service or possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi chip driver. An attacker is able to cause a denial of service or possibly execute arbitrary code, when a STA works in IBSS mode and connects to another STA (bsc#1157155).\n- CVE-2019-18675: Fixed an Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bsc#1157804).\n- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bsc#1159911).\n- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service by triggering bfa_port_get_stats() failures (bsc#1157303).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bsc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bsc#1159841).\n- CVE-2019-19532: Fixed multiple out-of-bounds write bugs that can be caused by a malicious USB device (bsc#1158824).\n- CVE-2019-19523: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bsc#115882).\n- CVE-2019-19537: Fixed a race condition that can be caused by a malicious USB device in the USB character device driver layer (bsc#1158904).\n- CVE-2019-19527, CVE-2019-19530, CVE-2019-19524: Fixed multiple use-after-free bug that could be caused by a malicious USB device (bsc#1158381, bsc#1158834, bsc#1158900).\n- CVE-2019-15213: Fixed a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bsc#1146544).\n- CVE-2019-19531: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bsc#1158445).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs (bsc#1157038).\n- CVE-2019-19227: Fixed a potential NULL pointer dereference in the AppleTalk subsystem (bsc#1157678).\n- CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd(), which allowed attackers to cause a denial of service (bsc#1157143).\n- CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c, which allowed attackers to cause a denial of service (bsc#1157070).\n- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which could cause denial of service (bsc#1149448).\n- CVE-2019-12456: Fixed a denial of service in _ctl_ioctl_main, which could be triggered by a local user (bsc#1136922).\n\nThe following non-security bugs were fixed:\n\n- Input: add safety guards to input_set_keycode() (bsc#1168075).\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- block: Fix oops scsi_disk_get() (bsc#1105327).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- kaiser: Fix for 32bit KAISER implementations (bsc#1157344).\n- klist: fix starting point removed bug in klist iterators (bsc#1156652).\n- kobject: Export kobject_get_unless_zero() (bsc#1105327).\n- kobject: fix kset_find_obj() race with concurrent last kobject_put() (bsc#1105327).\n- kref: minor cleanup (bsc#1105327).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- sched: Fix race between task_group and sched_task_group (bsc#1136471).\n- sched: Remove lockdep check in sched_move_task() (bsc#1136471).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1148871).\n- writeback: fix race that cause writeback hung (bsc#1161358).\n- x86: fix speculation bug reporting (bsc#1012382).\n","id":"SUSE-SU-2020:14354-1","modified":"2020-04-30T16:00:22Z","published":"2020-04-30T16:00:22Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1091041"},{"type":"REPORT","url":"https://bugzilla.suse.com/1105327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1131107"},{"type":"REPORT","url":"https://bugzilla.suse.com/1136471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1136922"},{"type":"REPORT","url":"https://bugzilla.suse.com/1146519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1146544"},{"type":"REPORT","url":"https://bugzilla.suse.com/1146612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1148871"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149448"},{"type":"REPORT","url":"https://bugzilla.suse.com/1152631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1156652"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157143"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157157"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157678"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157804"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158381"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158445"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158900"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1159285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1159841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1159908"},{"type":"REPORT","url":"https://bugzilla.suse.com/1159911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1161358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1164078"},{"type":"REPORT","url":"https://bugzilla.suse.com/1165111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1165985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1167629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1168075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1168829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1168854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-12456"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-14896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-14897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-15213"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-15916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-18660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-18675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19523"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19524"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19527"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19530"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19531"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19532"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19537"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-20096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-10942"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11608"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8647"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8649"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-9383"}],"related":["CVE-2019-12456","CVE-2019-14896","CVE-2019-14897","CVE-2019-15213","CVE-2019-15916","CVE-2019-18660","CVE-2019-18675","CVE-2019-19066","CVE-2019-19073","CVE-2019-19074","CVE-2019-19227","CVE-2019-19523","CVE-2019-19524","CVE-2019-19527","CVE-2019-19530","CVE-2019-19531","CVE-2019-19532","CVE-2019-19537","CVE-2019-19768","CVE-2019-19965","CVE-2019-19966","CVE-2019-20096","CVE-2020-10942","CVE-2020-11608","CVE-2020-8647","CVE-2020-8648","CVE-2020-8649","CVE-2020-9383"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2019-12456","CVE-2019-14896","CVE-2019-14897","CVE-2019-15213","CVE-2019-15916","CVE-2019-18660","CVE-2019-18675","CVE-2019-19066","CVE-2019-19073","CVE-2019-19074","CVE-2019-19227","CVE-2019-19523","CVE-2019-19524","CVE-2019-19527","CVE-2019-19530","CVE-2019-19531","CVE-2019-19532","CVE-2019-19537","CVE-2019-19768","CVE-2019-19965","CVE-2019-19966","CVE-2019-20096","CVE-2020-10942","CVE-2020-11608","CVE-2020-8647","CVE-2020-8648","CVE-2020-8649","CVE-2020-9383"]}