SUSE-SU-2021:1210-1: important: Security update for the Linux Kernel

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Apr 15 16:31:38 UTC 2021


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:1210-1
Rating:             important
References:         #1065600 #1065729 #1103990 #1103991 #1103992 
                    #1104270 #1104353 #1109837 #1111981 #1112374 
                    #1113295 #1113994 #1118657 #1118661 #1119113 
                    #1126390 #1129770 #1132477 #1142635 #1152446 
                    #1154048 #1169709 #1172455 #1173485 #1175165 
                    #1176720 #1176855 #1178163 #1178181 #1179243 
                    #1179428 #1179454 #1179660 #1179755 #1180846 
                    #1181507 #1181515 #1181544 #1181655 #1181674 
                    #1181747 #1181753 #1181843 #1182011 #1182175 
                    #1182485 #1182574 #1182715 #1182716 #1182717 
                    #1183018 #1183022 #1183023 #1183378 #1183379 
                    #1183380 #1183381 #1183382 #1183405 #1183416 
                    #1183509 #1183593 #1183646 #1183662 #1183686 
                    #1183692 #1183696 #1183755 #1183775 #1183861 
                    #1183871 #1184114 #1184120 #1184167 #1184168 
                    #1184170 #1184192 #1184193 #1184196 #1184198 
                    #1184391 #1184393 #1184397 #1184494 #1184511 
                    #1184583 
Cross-References:   CVE-2020-0433 CVE-2020-25670 CVE-2020-25671
                    CVE-2020-25672 CVE-2020-25673 CVE-2020-27170
                    CVE-2020-27171 CVE-2020-27815 CVE-2020-29368
                    CVE-2020-29374 CVE-2020-35519 CVE-2020-36311
                    CVE-2021-20219 CVE-2021-26930 CVE-2021-26931
                    CVE-2021-26932 CVE-2021-27363 CVE-2021-27364
                    CVE-2021-27365 CVE-2021-28038 CVE-2021-28660
                    CVE-2021-28688 CVE-2021-28964 CVE-2021-28971
                    CVE-2021-28972 CVE-2021-29154 CVE-2021-29264
                    CVE-2021-29265 CVE-2021-29647 CVE-2021-30002
                    CVE-2021-3428 CVE-2021-3444 CVE-2021-3483
                   
CVSS scores:
                    CVE-2020-0433 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-0433 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-25670 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2020-25671 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2020-25672 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2020-25673 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
                    CVE-2020-27170 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2020-27171 (NVD) : 6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
                    CVE-2020-27815 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-29368 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-29368 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-29374 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-29374 (SUSE): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
                    CVE-2020-35519 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-36311 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-20219 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26930 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-26930 (SUSE): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
                    CVE-2021-26931 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26931 (SUSE): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2021-26932 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26932 (SUSE): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
                    CVE-2021-27363 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
                    CVE-2021-27363 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2021-27364 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2021-27364 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2021-27365 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-27365 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-28038 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2021-28660 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-28660 (SUSE): 8 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-28964 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-28971 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-28972 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-28972 (SUSE): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-29154 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-29154 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-29264 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-29265 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-29265 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-30002 (NVD) : 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-3428 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2021-3444 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-3444 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP5
                    SUSE Linux Enterprise Software Development Kit 12-SP5
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Live Patching 12-SP5
                    SUSE Linux Enterprise High Availability 12-SP5
______________________________________________________________________________

   An update that solves 33 vulnerabilities and has 53 fixes
   is now available.

Description:

   The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various
   security and bugfixes.

   The following security bugs were fixed:

   - CVE-2021-3444: Fixed an issue with the bpf verifier which did not
     properly handle mod32 destination register truncation when the source
     register was known to be 0 leading to out of bounds read  (bsc#1184170).
   - CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent
     (bsc#1173485).
   - CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed
     attackers to obtain sensitive information from kernel memory because of
     a partially uninitialized data structure (bsc#1184192 ).
   - CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have
     allowed attackers to cause a denial of service due to race conditions
     during an update of the local and shared status (bsc#1184167).
   - CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver
     which could have allowed attackers to cause a system crash due to a
     calculation of negative fragment size (bsc#1184168).
   - CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a
     new device name to the driver from userspace, allowing userspace to
     write data to the kernel stack frame directly (bsc#1184198).
   - CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could
     have caused a system crash because the PEBS status in a PEBS record was
     mishandled (bsc#1184196 ).
   - CVE-2021-28964: Fixed a race condition in get_old_root which could have
     allowed attackers to cause a denial of service (bsc#1184193).
   - CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
   - CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan
     (bsc#1183593 ).
   - CVE-2021-28038: Fixed an issue with the netback driver which was lacking
     necessary treatment of errors such as failed memory allocations
     (bsc#1183022).
   - CVE-2021-27365: Fixed an issue where an unprivileged user can send a
     Netlink message that is associated with iSCSI, and has a length up to
     the maximum length of a Netlink message (bsc#1182715).
   - CVE-2021-27364: Fixed an issue where an attacker could craft Netlink
     messages (bsc#1182717).
   - CVE-2021-27363: Fixed a kernel pointer leak which could have been used
     to determine the address of the iscsi_transport structure (bsc#1182716).
   - CVE-2021-26932: Fixed improper error handling issues in Linux grant
     mapping (XSA-361 bsc#1181747).
   - CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant
     mapping errors as bugs (XSA-362 bsc#1181753).
   - CVE-2021-26930: Fixed an improper error handling in blkback's grant
     mapping (XSA-365 bsc#1181843).
   - CVE-2020-35519: Fixed an out-of-bounds memory access  was found in
     x25_bind (bsc#1183696).
   - CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write
     implementation which could have granted unintended write access
     (bsc#1179660, bsc#1179428).
   - CVE-2020-27815: Fixed an issue in JFS filesystem  where could have
     allowed an attacker to execute code (bsc#1179454).
   - CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds
     speculation on pointer arithmetic, leading to side-channel attacks that
     defeat Spectre mitigations and obtain sensitive information from kernel
     memory (bsc#1183775).
   - CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre
     mitigations and obtain sensitive information from kernel memory
     (bsc#1183686).
   - CVE-2020-0433: Fixed a use after free due to improper locking which
     could have led to local escalation of privilege (bsc#1176720).
   - CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
   - CVE-2021-30002: Fixed a memory leak for large arguments in
     video_usercopy (bsc#1184120).
   - CVE-2021-29154: Fixed incorrect computation of branch displacements,
     allowing arbitrary code execution (bsc#1184391).
   - CVE-2021-20219: Fixed a denial of service in n_tty_receive_char_special
     (bsc#1184397).
   - CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering
     destruction of a large SEV VM (bsc#1184511).
   - CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed
     multiple bugs in NFC subsytem (bsc#1178181).

   The following non-security bugs were fixed:

   - ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
   - ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
   - ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
   - ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
   - amba: Fix resource leak for drivers without .remove (git-fixes).
   - bfq: Fix kABI for update internal depth state when queue depth changes
     (bsc#1172455).
   - bfq: update internal depth state when queue depth changes (bsc#1172455).
   - block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
   - Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data
     (git-fixes).
   - Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
   - Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
   - bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
   - bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
   - bpf: fix subprog verifier bypass by div/mod by 0 exception (bsc#1184170).
   - bpf: fix x64 JIT code generation for jmp to 1st insn (bsc#1178163).
   - bpf_lru_list: Read double-checked variable once without lock (git-fixes).
   - bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686
     bsc#1183775).
   - bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
   - bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
   - can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
   - can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
   - can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning
     (git-fixes).
   - can: peak_usb: add forgotten supported devices (git-fixes).
   - can: peak_usb: Revert "can: peak_usb: add forgotten supported devices"
     (git-fixes).
   - can: skb: can_skb_set_owner(): fix ref counting if socket was closed
     before setting skb ownership (git-fixes).
   - cifs: change noisy error message to FYI (bsc#1181507).
   - cifs: check all path components in resolved dfs target (bsc#1179755).
   - cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507).
   - cifs: do not send close in compound create+close requests (bsc#1181507).
   - cifs: fix nodfs mount option (bsc#1179755).
   - cifs: introduce helper for finding referral server (bsc#1179755).
   - cifs: New optype for session operations (bsc#1181507).
   - cifs: print MIDs in decimal notation (bsc#1181507).
   - cifs: return proper error code in statfs(2) (bsc#1181507).
   - cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
   - cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in
     cxgb4 and ulds (bsc#1104270).
   - dmaengine: hsu: disable spurious interrupt (git-fixes).
   - drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if
     (bsc#1129770)
   - drm/atomic: Create __drm_atomic_helper_crtc_reset() for subclassing
     (bsc#1142635)
   - drm: bridge: dw-hdmi: Avoid resetting force in the detect function
     (bsc#1129770)
   - drm/compat: Clear bounce structures (bsc#1129770)
   - drm/etnaviv: replace MMU flush marker with flush sequence (bsc#1154048)
   - drm/gma500: Fix error return code in psb_driver_load() (bsc#1129770)
   - drm/mediatek: Add missing put_device() call in mtk_drm_kms_init()
     (bsc#1152446)
   - drm/mediatek: Fix aal size config (bsc#1129770)
   - drm: meson_drv add shutdown function (git-fixes).
   - drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register
     (git-fixes).
   - drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (bsc#1129770)
   - drm/msm: fix shutdown hook in case GPU components failed to bind
     (git-fixes).
   - drm: mxsfb: check framebuffer pitch (bsc#1129770)
   - drm/omap: fix max fclk divider for omap36xx (bsc#1152446)
   - drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1129770)
   - drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel
     (bsc#1129770)
   - drm/radeon: fix AGP dependency (git-fixes).
   - drm: rcar-du: Put reference to VSP device (bsc#1129770)
   - drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1129770)
   - drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1129770)
   - ethernet: alx: fix order of calls on resume (git-fixes).
   - fbdev: aty: SPARC64 requires FB_ATY_CT (bsc#1129770)
   - firmware/efi: Fix a use after bug in efi_mem_reserve_persistent
     (git-fixes).
   - fix setting irq affinity (bsc#1184583)
   - futex: Prevent robust futex exit race (git-fixes).
   - gma500: clean up error handling in init (bsc#1129770)
   - gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
   - HID: make arrays usage and value to be the same (git-fixes).
   - i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
   - i40e: Add zero-initialization of AQ command structures (bsc#1109837
     bsc#1111981).
   - i40e: Fix add TC filter for IPv6 (bsc#1109837 bsc#1111981 ).
   - i40e: Fix endianness conversions (bsc#1109837 bsc#1111981 ).
   - IB/mlx5: Return appropriate error code instead of ENOMEM (bsc#1103991).
   - ibmvnic: add comments for spinlock_t definitions (bsc#1184114 ltc#192237
     bsc#1183871 ltc#192139).
   - ibmvnic: add memory barrier to protect long term buffer (bsc#1184114
     ltc#192237 bsc#1182485 ltc#191591).
   - ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
   - ibmvnic: avoid multiple line dereference (bsc#1184114 ltc#192237
     bsc#1183871 ltc#192139).
   - ibmvnic: compare adapter->init_done_rc with more readable
     ibmvnic_rc_codes (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: Correctly re-enable interrupts in NAPI polling routine
     (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: create send_control_ip_offload (bsc#1184114 ltc#192237
     bsc#1179243 ltc#189290).
   - ibmvnic: create send_query_ip_offload (bsc#1184114 ltc#192237
     bsc#1179243 ltc#189290).
   - ibmvnic: Do not replenish RX buffers after every polling loop
     (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1184114
     ltc#192237 bsc#1182485 ltc#191591).
   - ibmvnic: Ensure that device queue memory is cache-line aligned
     (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: Ensure that SCRQ entry reads are correctly ordered (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: fix block comments (bsc#1184114 ltc#192237 bsc#1183871
     ltc#192139).
   - ibmvnic: fix braces (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
   - ibmvnic: fix miscellaneous checks (bsc#1184114 ltc#192237 bsc#1183871
     ltc#192139).
   - ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning
     (bsc#1184114 ltc#192237).
   - ibmvnic: Fix TX completion error handling (bsc#1184114 ltc#192237
     bsc#1179243 ltc#189290).
   - ibmvnic: Fix use-after-free of VNIC login response buffer (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: handle inconsistent login with reset (bsc#1184114 ltc#192237
     bsc#1179243 ltc#189290).
   - ibmvnic: Harden device Command Response Queue handshake (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: merge do_change_param_reset into do_reset (bsc#1184114
     ltc#192237 bsc#1183871 ltc#192139).
   - ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: no reset timeout for 5 seconds after reset (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: prefer strscpy over strlcpy (bsc#1184114 ltc#192237 bsc#1183871
     ltc#192139).
   - ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1184114
     ltc#192237 bsc#1183871 ltc#192139).
   - ibmvnic: reduce wait for completion time (bsc#1184114 ltc#192237
     bsc#1179243 ltc#189290).
   - ibmvnic: remove excessive irqsave (bsc#1065729).
   - ibmvnic: remove never executed if statement (bsc#1184114 ltc#192237
     bsc#1179243 ltc#189290).
   - ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1184114
     ltc#192237 bsc#1183871 ltc#192139).
   - ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1184114
     ltc#192237 bsc#1183871 ltc#192139).
   - ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: rename send_cap_queries to send_query_cap (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: rename send_map_query to send_query_map (bsc#1184114 ltc#192237
     bsc#1179243 ltc#189290).
   - ibmvnic: rework to ensure SCRQ entry reads are properly ordered
     (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
   - ibmvnic: send_login should check for crq errors (bsc#1184114 ltc#192237
     bsc#1179243 ltc#189290).
   - ibmvnic: simplify reset_long_term_buff function (bsc#1184114 ltc#192237
     bsc#1183023 ltc#191791).
   - ibmvnic: skip send_request_unmap for timeout reset (bsc#1184114
     ltc#192237 bsc#1182485 ltc#191591).
   - ibmvnic: skip tx timeout reset while in resetting (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: stop free_all_rwi on failed reset (bsc#1184114 ltc#192237
     bsc#1179243 ltc#189290).
   - ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct
     (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions
     (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).
   - ibmvnic: track pending login (bsc#1184114 ltc#192237 bsc#1179243
     ltc#189290).
   - ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX
     buffers (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
   - ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114
     ltc#192237).
   - ice: Account for port VLAN in VF max packet size calculation
     (bsc#1118661).
   - igc: check return value of ret_val in igc_config_fc_after_link_up
     (bsc#1118657).
   - igc: Report speed and duplex as unknown when device is runtime suspended
     (jsc#SLE-4799).
   - igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr
     (bsc#1118657).
   - iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel
     (git-fixes).
   - iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler
     (git-fixes).
   - iio: hid-sensor-humidity: Fix alignment issue of timestamp channel
     (git-fixes).
   - iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
   - iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
   - Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
   - Input: i8042 - unbreak Pegatron C15B (git-fixes).
   - Input: raydium_ts_i2c - do not send zero length (git-fixes).
   - Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox
     Series X|S (git-fixes).
   - Input: xpad - sync supported devices with fork on GitHub (git-fixes).
   - iommu/amd: Fix sleeping in atomic in increase_address_space()
     (bsc#1183378).
   - iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183379).
   - iommu/vt-d: Avoid panic if iommu init fails in tboot system
     (bsc#1183380).
   - iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183381).
   - ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (bsc#1113994).
   - kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
   - kabi/severities: Add rtas_online_cpus_mask, rtas_offline_cpus_mask
   - kernel/smp: add boot parameter for controlling CSD lock debugging
     (bsc#1180846).
   - kernel/smp: add more data to CSD lock debugging (bsc#1180846).
   - kernel/smp: prepare more CSD lock debugging (bsc#1180846).
   - kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
   - KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off
     (bsc#1183382).
   - lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
   - locking/mutex: Fix non debug version of mutex_lock_io_nested()
     (git-fixes).
   - mac80211: fix double free in ibss_leave (git-fixes).
   - mac80211: fix rate mask reset (git-fixes).
   - media: usbtv: Fix deadlock on suspend (git-fixes).
   - media: uvcvideo: Allow entities with no pads (git-fixes).
   - misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom
     (git-fixes).
   - mmc: core: Fix partition switch time for eMMC (git-fixes).
   - mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of
     DEFINE_SIMPLE_ATTRIBUTE.
   - mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
   - mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
   - mmc: sdhci-of-arasan: Add missed checks for devm_clk_register()
     (git-fixes).
   - mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
   - net: bridge: use switchdev for port flags set through sysfs too
     (bsc#1112374).
   - net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
   - net: core: introduce __netdev_notify_peers (bsc#1184114 ltc#192237
     bsc#1183871 ltc#192139).
   - net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours
     (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
   - net: hns3: add a check for index in hclge_get_rss_key() (bsc#1126390).
   - net: hns3: add a check for queue_id in hclge_reset_vf_queue()
     (bsc#1104353).
   - net: hns3: fix bug when calculating the TCAM table info (bsc#1104353).
   - net: hns3: fix query vlan mask value error for flow director
     (bsc#1104353).
   - net/mlx5e: Update max_opened_tc also when channels are closed
     (bsc#1103990).
   - net: phy: micrel: set soft_reset callback to genphy_soft_reset for
     KSZ8081 (bsc#1119113).
   - net: re-solve some conflicts after net -> net-next merge (bsc#1184114
     ltc#192237 bsc#1176855 ltc#187293).
   - net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
   - net: usb: ax88179_178a: fix missing stop entry in driver_info
     (git-fixes).
   - net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
   - PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller
     (git-fixes).
   - PCI: Align checking of syscall user config accessors (git-fixes).
   - phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
   - platform/x86: i2c-multi-instantiate: Do not create platform device for
     INT3515 ACPI nodes (git-fixes).
   - powerpc/64s: Fix instruction encoding for lis in ppc_function_entry()
     (bsc#1065729).
   - powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692
     ltc#191963).
   - powerpc: Convert to using %pOFn instead of device_node.name (bsc#1181674
     ltc#189159).
   - powerpc: Fix some spelling mistakes (bsc#1181674 ltc#189159).
   - powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674
     ltc#189159).
   - powerpc: kABI: add back suspend_disable_cpu in machdep_calls
     (bsc#1181674 ltc#189159).
   - powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
   - powerpc/mm/pkeys: Make pkey access check work on execute_only_key
     (bsc#1181544 ltc#191080 git-fixes).
   - powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
   - powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674
     ltc#189159).
   - powerpc/numa: remove ability to enable topology updates (bsc#1181674
     ltc#189159).
   - powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
   - powerpc/numa: Remove late request for home node associativity
     (bsc#1181674 ltc#189159).
   - powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
   - powerpc/numa: remove start/stop_topology_update() (bsc#1181674
     ltc#189159).
   - powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
   - powerpc/numa: remove unreachable topology timer code (bsc#1181674
     ltc#189159).
   - powerpc/numa: remove unreachable topology update code (bsc#1181674
     ltc#189159).
   - powerpc/numa: remove unreachable topology workqueue code (bsc#1181674
     ltc#189159).
   - powerpc/numa: remove vphn_enabled and prrn_enabled internal flags
     (bsc#1181674 ltc#189159).
   - powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674
     ltc#189159).
   - powerpc/numa: Suppress "VPHN is not supported" messages (bsc#1181674
     ltc#189159).
   - powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
   - powerpc/pseries: Add empty update_numa_cpu_lookup_table() for NUMA=n
     (bsc#1181674 ltc#189159).
   - powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655
     ltc#190855).
   - powerpc/pseries: Generalize hcall_vphn() (bsc#1181674 ltc#189159).
   - powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend
     ops (bsc#1181674 ltc#189159).
   - powerpc/pseries/hibernation: pass stream id via function arguments
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/hibernation: perform post-suspend fixups later
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674
     ltc#189159).
   - powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674
     ltc#189159).
   - powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me()
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/mobility: add missing break to default case (bsc#1181674
     ltc#189159).
   - powerpc/pseries/mobility: Add pr_debug() for device tree changes
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/mobility: do not error on absence of ibm, update-nodes
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/mobility: error message improvements (bsc#1181674
     ltc#189159).
   - powerpc/pseries/mobility: extract VASI session polling logic
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/mobility: handle premature return from H_JOIN
     (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
   - powerpc/pseries/mobility: refactor node lookup during DT update
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/mobility: retry partition suspend after error
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
   - powerpc/pseries/mobility: signal suspend cancellation to platform
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/mobility: use rtas_activate_firmware() on resume
     (bsc#1181674 ltc#189159).
   - powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674
     ltc#189159).
   - powerpc/pseries/mobility: use struct for shared state (bsc#1181674
     ltc#189159 git-fixes bsc#1183662 ltc#191922).
   - powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
   - powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
   - powerpc/pseries: remove memory "re-add" implementation (bsc#1181674
     ltc#189159).
   - powerpc/pseries: remove obsolete memory hotplug DT notifier code
     (bsc#1181674 ltc#189159).
   - powerpc/pseries: remove prrn special case from DT update path
     (bsc#1181674 ltc#189159).
   - powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
   - powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
   - powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674
     ltc#189159).
   - powerpc/rtas: dispatch partition migration requests to pseries
     (bsc#1181674 ltc#189159).
   - powerpc/rtasd: simplify handle_rtas_event(), emit message on events
     (bsc#1181674 ltc#189159).
   - powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674
     ltc#189159).
   - powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674
     ltc#189159).
   - powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
   - powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674
     ltc#189159).
   - powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674
     ltc#189159).
   - powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe
     (bsc#1181674 ltc#189159).
   - powerpc/rtas: Unexport rtas_online_cpus_mask, rtas_offline_cpus_mask
     (bsc#1181674 ltc#189159).
   - powerpc/vio: Use device_type to detect family (bsc#1181674 ltc#189159).
   - printk: fix deadlock when kernel panic (bsc#1183018).
   - pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477
     ltc#175530).
   - pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477
     ltc#175530).
   - pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare()
     (git-fixes).
   - qxl: Fix uninitialised struct field head.surface_id (git-fixes).
   - random: fix the RNDRESEEDCRNG ioctl (git-fixes).
   - rcu: Allow only one expedited GP to run concurrently with (git-fixes)
   - rcu: Fix missed wakeup of exp_wq waiters (git-fixes)
   - RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (bsc#1103991).
   - RDMA/rxe: Remove useless code in rxe_recv.c (bsc#1103992 ).
   - RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes
     (bsc#1169709)
   - RDMA/uverbs: Fix kernel-doc warning of _uverbs_alloc (bsc#1103992).
   - Revert "ibmvnic: remove never executed if statement" (bsc#1184114
     ltc#192237 bsc#1179243 ltc#189290).
   - rpadlpar: fix potential drc_name corruption in store functions
     (bsc#1183416 ltc#191079).
   - rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
   - s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
   - s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
   - s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
   - s390/dasd: fix hanging offline processing due to canceled worker
     (bsc#1175165).
   - s390/dasd: fix hanging offline processing due to canceled worker
     (bsc#1175165).
   - s390/pci: Fix s390_mmio_read/write with MIO (LTC#192079 bsc#1183755).
   - s390/vtime: fix increased steal time accounting (bsc#1183861).
   - sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
   - sched/vtime: Fix guest/system mis-accounting on task switch (git-fixes)
   - scsi: lpfc: Change wording of invalid pci reset log message
     (bsc#1182574).
   - scsi: lpfc: Correct function header comments related to ndlp reference
     counting (bsc#1182574).
   - scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
   - scsi: lpfc: Fix ancient double free (bsc#1182574).
   - scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
   - scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery
     (bsc#1182574).
   - scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1182574).
   - scsi: lpfc: Fix FLOGI failure due to accessing a freed node
     (bsc#1182574).
   - scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe
     (bsc#1182574).
   - scsi: lpfc: Fix kerneldoc inconsistency in lpfc_sli4_dump_page_a0()
     (bsc#1182574).
   - scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference
     (bsc#1182574).
   - scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
   - scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()
     (bsc#1182574).
   - scsi: lpfc: Fix 'physical' typos (bsc#1182574).
   - scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
   - scsi: lpfc: Fix pt2pt connection does not recover after LOGO
     (bsc#1182574).
   - scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
   - scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
   - scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
   - scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path
     (bsc#1182574).
   - scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf
     (bsc#1182574).
   - scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
   - scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
   - scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
   - scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes
     (bsc#1182574).
   - scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
   - selinux: never allow relabeling on context mounts (git-fixes).
   - smb3: add dynamic trace point to trace when credits obtained
     (bsc#1181507).
   - smb3: fix crediting for compounding when only one request in flight
     (bsc#1181507).
   - smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
   - Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86
     (bsc#1180846).
   - Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).
   - usb: gadget: f_uac2: always increase endpoint max_packet_size by one
     audio slot (git-fixes).
   - usbip: fix stub_dev to check for stream socket (git-fixes).
   - usbip: fix stub_dev usbip_sockfd_store() races leading to gpf
     (git-fixes).
   - usbip: Fix unsafe unaligned pointer usage (git-fixes).
   - usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
   - usbip: fix vhci_hcd to check for stream socket (git-fixes).
   - usbip: tools: fix build error for multiple definition (git-fixes).
   - usb: quirks: add quirk to start video capture on ELMO L-12F document
     camera reliable (git-fixes).
   - usb: replace hardcode maximum usb string length by definition
     (git-fixes).
   - usb: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
   - usb: serial: option: add Quectel EM160R-GL (git-fixes).
   - usb-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
   - use __netdev_notify_peers in ibmvnic (bsc#1184114 ltc#192237 bsc#1183871
     ltc#192139).
   - video: fbdev: acornfb: remove free_unused_pages() (bsc#1129770)
   - video: fbdev: atmel_lcdfb: fix return error code in (bsc#1129770)
     Backporting notes: 	* context changes 	* fallout from trailing
     whitespaces
   - vsprintf: Do not have bprintf dereference pointers (bsc#1184494).
   - vsprintf: Do not preprocess non-dereferenced pointers for bprintf (%px
     and %pK) (bsc#1184494).
   - vsprintf: Fix off-by-one bug in bstr_printf() processing dereferenced
     pointers (bsc#1184494).
   - wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
   - x86/ioapic: Ignore IRQ2 again (12sp5).
   - x86/mem_encrypt: Correct physical address calculation in
     __set_clr_pte_enc() (12sp5).
   - xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022
     XSA-367).
   - xen/netback: avoid race in xenvif_rx_ring_slots_available()
     (bsc#1065600).
   - xen/netback: fix spurious event detection for common event case
     (bsc#1182175).
   - xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022
     XSA-367).
   - xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
   - xsk: Remove dangling function declaration from header file (bsc#1109837).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP5:

      zypper in -t patch SUSE-SLE-WE-12-SP5-2021-1210=1

   - SUSE Linux Enterprise Software Development Kit 12-SP5:

      zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-1210=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-1210=1

   - SUSE Linux Enterprise Live Patching 12-SP5:

      zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2021-1210=1

   - SUSE Linux Enterprise High Availability 12-SP5:

      zypper in -t patch SUSE-SLE-HA-12-SP5-2021-1210=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64):

      kernel-default-debuginfo-4.12.14-122.66.2
      kernel-default-debugsource-4.12.14-122.66.2
      kernel-default-extra-4.12.14-122.66.2
      kernel-default-extra-debuginfo-4.12.14-122.66.2

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):

      kernel-obs-build-4.12.14-122.66.2
      kernel-obs-build-debugsource-4.12.14-122.66.2

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (noarch):

      kernel-docs-4.12.14-122.66.2

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      kernel-default-4.12.14-122.66.2
      kernel-default-base-4.12.14-122.66.2
      kernel-default-base-debuginfo-4.12.14-122.66.2
      kernel-default-debuginfo-4.12.14-122.66.2
      kernel-default-debugsource-4.12.14-122.66.2
      kernel-default-devel-4.12.14-122.66.2
      kernel-syms-4.12.14-122.66.2

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      kernel-devel-4.12.14-122.66.2
      kernel-macros-4.12.14-122.66.2
      kernel-source-4.12.14-122.66.2

   - SUSE Linux Enterprise Server 12-SP5 (x86_64):

      kernel-default-devel-debuginfo-4.12.14-122.66.2

   - SUSE Linux Enterprise Server 12-SP5 (s390x):

      kernel-default-man-4.12.14-122.66.2

   - SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):

      kernel-default-debuginfo-4.12.14-122.66.2
      kernel-default-debugsource-4.12.14-122.66.2
      kernel-default-kgraft-4.12.14-122.66.2
      kernel-default-kgraft-devel-4.12.14-122.66.2
      kgraft-patch-4_12_14-122_66-default-1-8.3.2

   - SUSE Linux Enterprise High Availability 12-SP5 (ppc64le s390x x86_64):

      cluster-md-kmp-default-4.12.14-122.66.2
      cluster-md-kmp-default-debuginfo-4.12.14-122.66.2
      dlm-kmp-default-4.12.14-122.66.2
      dlm-kmp-default-debuginfo-4.12.14-122.66.2
      gfs2-kmp-default-4.12.14-122.66.2
      gfs2-kmp-default-debuginfo-4.12.14-122.66.2
      kernel-default-debuginfo-4.12.14-122.66.2
      kernel-default-debugsource-4.12.14-122.66.2
      ocfs2-kmp-default-4.12.14-122.66.2
      ocfs2-kmp-default-debuginfo-4.12.14-122.66.2


References:

   https://www.suse.com/security/cve/CVE-2020-0433.html
   https://www.suse.com/security/cve/CVE-2020-25670.html
   https://www.suse.com/security/cve/CVE-2020-25671.html
   https://www.suse.com/security/cve/CVE-2020-25672.html
   https://www.suse.com/security/cve/CVE-2020-25673.html
   https://www.suse.com/security/cve/CVE-2020-27170.html
   https://www.suse.com/security/cve/CVE-2020-27171.html
   https://www.suse.com/security/cve/CVE-2020-27815.html
   https://www.suse.com/security/cve/CVE-2020-29368.html
   https://www.suse.com/security/cve/CVE-2020-29374.html
   https://www.suse.com/security/cve/CVE-2020-35519.html
   https://www.suse.com/security/cve/CVE-2020-36311.html
   https://www.suse.com/security/cve/CVE-2021-20219.html
   https://www.suse.com/security/cve/CVE-2021-26930.html
   https://www.suse.com/security/cve/CVE-2021-26931.html
   https://www.suse.com/security/cve/CVE-2021-26932.html
   https://www.suse.com/security/cve/CVE-2021-27363.html
   https://www.suse.com/security/cve/CVE-2021-27364.html
   https://www.suse.com/security/cve/CVE-2021-27365.html
   https://www.suse.com/security/cve/CVE-2021-28038.html
   https://www.suse.com/security/cve/CVE-2021-28660.html
   https://www.suse.com/security/cve/CVE-2021-28688.html
   https://www.suse.com/security/cve/CVE-2021-28964.html
   https://www.suse.com/security/cve/CVE-2021-28971.html
   https://www.suse.com/security/cve/CVE-2021-28972.html
   https://www.suse.com/security/cve/CVE-2021-29154.html
   https://www.suse.com/security/cve/CVE-2021-29264.html
   https://www.suse.com/security/cve/CVE-2021-29265.html
   https://www.suse.com/security/cve/CVE-2021-29647.html
   https://www.suse.com/security/cve/CVE-2021-30002.html
   https://www.suse.com/security/cve/CVE-2021-3428.html
   https://www.suse.com/security/cve/CVE-2021-3444.html
   https://www.suse.com/security/cve/CVE-2021-3483.html
   https://bugzilla.suse.com/1065600
   https://bugzilla.suse.com/1065729
   https://bugzilla.suse.com/1103990
   https://bugzilla.suse.com/1103991
   https://bugzilla.suse.com/1103992
   https://bugzilla.suse.com/1104270
   https://bugzilla.suse.com/1104353
   https://bugzilla.suse.com/1109837
   https://bugzilla.suse.com/1111981
   https://bugzilla.suse.com/1112374
   https://bugzilla.suse.com/1113295
   https://bugzilla.suse.com/1113994
   https://bugzilla.suse.com/1118657
   https://bugzilla.suse.com/1118661
   https://bugzilla.suse.com/1119113
   https://bugzilla.suse.com/1126390
   https://bugzilla.suse.com/1129770
   https://bugzilla.suse.com/1132477
   https://bugzilla.suse.com/1142635
   https://bugzilla.suse.com/1152446
   https://bugzilla.suse.com/1154048
   https://bugzilla.suse.com/1169709
   https://bugzilla.suse.com/1172455
   https://bugzilla.suse.com/1173485
   https://bugzilla.suse.com/1175165
   https://bugzilla.suse.com/1176720
   https://bugzilla.suse.com/1176855
   https://bugzilla.suse.com/1178163
   https://bugzilla.suse.com/1178181
   https://bugzilla.suse.com/1179243
   https://bugzilla.suse.com/1179428
   https://bugzilla.suse.com/1179454
   https://bugzilla.suse.com/1179660
   https://bugzilla.suse.com/1179755
   https://bugzilla.suse.com/1180846
   https://bugzilla.suse.com/1181507
   https://bugzilla.suse.com/1181515
   https://bugzilla.suse.com/1181544
   https://bugzilla.suse.com/1181655
   https://bugzilla.suse.com/1181674
   https://bugzilla.suse.com/1181747
   https://bugzilla.suse.com/1181753
   https://bugzilla.suse.com/1181843
   https://bugzilla.suse.com/1182011
   https://bugzilla.suse.com/1182175
   https://bugzilla.suse.com/1182485
   https://bugzilla.suse.com/1182574
   https://bugzilla.suse.com/1182715
   https://bugzilla.suse.com/1182716
   https://bugzilla.suse.com/1182717
   https://bugzilla.suse.com/1183018
   https://bugzilla.suse.com/1183022
   https://bugzilla.suse.com/1183023
   https://bugzilla.suse.com/1183378
   https://bugzilla.suse.com/1183379
   https://bugzilla.suse.com/1183380
   https://bugzilla.suse.com/1183381
   https://bugzilla.suse.com/1183382
   https://bugzilla.suse.com/1183405
   https://bugzilla.suse.com/1183416
   https://bugzilla.suse.com/1183509
   https://bugzilla.suse.com/1183593
   https://bugzilla.suse.com/1183646
   https://bugzilla.suse.com/1183662
   https://bugzilla.suse.com/1183686
   https://bugzilla.suse.com/1183692
   https://bugzilla.suse.com/1183696
   https://bugzilla.suse.com/1183755
   https://bugzilla.suse.com/1183775
   https://bugzilla.suse.com/1183861
   https://bugzilla.suse.com/1183871
   https://bugzilla.suse.com/1184114
   https://bugzilla.suse.com/1184120
   https://bugzilla.suse.com/1184167
   https://bugzilla.suse.com/1184168
   https://bugzilla.suse.com/1184170
   https://bugzilla.suse.com/1184192
   https://bugzilla.suse.com/1184193
   https://bugzilla.suse.com/1184196
   https://bugzilla.suse.com/1184198
   https://bugzilla.suse.com/1184391
   https://bugzilla.suse.com/1184393
   https://bugzilla.suse.com/1184397
   https://bugzilla.suse.com/1184494
   https://bugzilla.suse.com/1184511
   https://bugzilla.suse.com/1184583



More information about the sle-updates mailing list