|
Bugzilla – Full Text Bug Listing |
| Summary: | Kernel crashes on Dell PowerEdge R340 and R440 after latest kernel upgrade | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Distribution | Reporter: | Ralf Ronneburger <r.ronneburger> |
| Component: | Kernel | Assignee: | Borislav Petkov <bpetkov> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Critical | ||
| Priority: | P1 - Urgent | CC: | admin, akruppa, ali.abdallah, andrew.gracey, ardovm, bpetkov, bugs, cachen, dawei.pang, henk.vanvelden, kkaempf, klaus.braun, koehnevolker, mark.harvey, meissner, mhocko, r.ronneburger, suse, tiwai, vetter, yan.huang |
| Version: | Leap 15.3 | Flags: | mhocko:
needinfo?
(r.ronneburger) |
| Target Milestone: | --- | ||
| Hardware: | x86-64 | ||
| OS: | openSUSE Leap 15.3 | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Ralf Ronneburger
2022-07-19 12:23:11 UTC
Same here on HP Z 240. Working with kernel 5.3.18-150300.59.81.1 is not possible, booting with 5.3.18-150300.59.76.1 seems to be ok. During first boot after upgrade to 5.3.18-150300.59.81.1 purge old kernels takes much longer than expected and obviously didn't succeed: 2022-07-19T11:26:14.838055+02:00 localhost zypper[1165]: (5/5) Removing kernel-default-5.3.18-150300.59.71.2.x86_64 [....error] 2022-07-19T11:26:14.838102+02:00 localhost zypper[1165]: Removal of (604)kernel-default-5.3.18-150300.59.71.2.x86_64(@System) failed: 2022-07-19T11:26:14.838144+02:00 localhost zypper[1165]: Error: Subprocess failed. Error: RPM failed: Command was killed by signal 9 (Killed; Out of memory?). 2022-07-19T11:26:14.838183+02:00 localhost zypper[1165]: Abort, retry, ignore? [a/r/i] (a): a 2022-07-19T11:26:14.839147+02:00 localhost zypper[1165]: Problem occurred during or after installation or removal of packages: 2022-07-19T11:26:14.839190+02:00 localhost zypper[1165]: Installation has been aborted as directed. 2022-07-19T11:26:14.839226+02:00 localhost zypper[1165]: Please see the above error message for a hint. 2022-07-19T11:26:14.857411+02:00 localhost systemd[1]: purge-kernels.service: Succeeded. 2022-07-19T11:26:14.857509+02:00 localhost systemd[1]: Finished Purge old kernels. And here the messages about the BUG: kernel NULL pointer dereference: 2022-07-19T11:27:09.640166+02:00 localhost kernel: [ 105.811063] BUG: kernel NULL pointer dereference, address: 0000000000000000 2022-07-19T11:27:09.640176+02:00 localhost kernel: [ 105.811067] #PF: supervisor instruction fetch in kernel mode 2022-07-19T11:27:09.640177+02:00 localhost kernel: [ 105.811068] #PF: error_code(0x0010) - not-present page 2022-07-19T11:27:09.640178+02:00 localhost kernel: [ 105.811070] PGD 0 P4D 0 2022-07-19T11:27:09.640178+02:00 localhost kernel: [ 105.811072] Oops: 0010 [#3] SMP PTI 2022-07-19T11:27:09.640178+02:00 localhost kernel: [ 105.811074] CPU: 7 PID: 14589 Comm: single Tainted: P D OE X N 5.3.18-150300.59.81-default #1 SLE15-SP3 2022-07-19T11:27:09.640179+02:00 localhost kernel: [ 105.811076] Hardware name: HP HP Z240 Tower Workstation/802F, BIOS N51 Ver. 01.63 10/05/2017 Same here on a simple desktop (Fujitsu P958) with kernel 5.3.18-150300.59.81: crashes after some minutes. Reverting to previous kernel (5.3.18-150300.59.76): ok. Could you provide the full kernel log please? Boris, faulting from the asm glue code sounds suspicious and it would suggest recent RetBleed related changes. Could you have a look please? Does booting with spectre_v2=off fix the problems? Ok, it is probably semi-stab in the dark but can folks try this kernel: https://download.opensuse.org/repositories/home:/bpetkov:/15sp3/pool/ ? Thx. Same here for our Dell R540, but also for HP AIO 800G3. This is a nightmare! Oh, and this is for the kernel released for SLES and SLED 15 sp3. spectre_v2=off seems to fix the problem, at least I could boot our main Dell 540 with it that paniced consequently before. Before I came here I've opened a SR with SuSE support (no. 00355361) which contains a dmesg output from a HP AIO that I could collect before it crashed, as well as a screenlog from the full boot process of the Dell 540. I won't post them here in case they contain sensitive information, but you should be able to access them internally I guess. If that helps: all the failing Dell R540 are the same generation and 1.5 years older than those who boot fine with the new kernel. The failing ones have CPU Intel Xeon Silver 4110 or 4112, the working ones have Silver 4210/12/14. Similar for the HP desktops. The failing ones are 800 G3, the working ones 800 G5. Failing CPUs are Intel Core i7-7700, working ones are i7-9700. Thanks. You can use the temporary workaround for the time being. I was able to reproduce here and am debugging. May I just ask: Is kernel-*-5.3.18-150300.59.81.1 *still* in the repos and offered to openSuSE 15.3 systems? To me it looks like this. Same problem here: Dell XPS 8960 Intel i7-8700, OpenSuse leap 15-3 (all mandatory patches installed). kernel hangs after ~5minutes. Older kernel -76 is stable. the kernel is now marked as retracted. (meaning it is still on the servers, but will no longer be offered during zypper up or zypper patch.) I replacement / fixed kernel is being worked on. Thanks for the solution. BTW it is not restricted to DELL systems. I have problems of the kind on a HP Pavilion. Ok, new kernel here: https://download.opensuse.org/repositories/home:/bpetkov:/15sp3/pool/ Pls test. Thx. I could test one HP AIO 800 G3 which doesn't show any kernel oops and still runs after 45 minutes. And one Dell R540 that did always crash during boot and now reaches multi-user.target and is still running after some minutes, also without any oops in dmesg. So, wrt this very small test set, your kernel seems to work fine! Thanks for testing! Lemme know should you see any hickups in the coming days. Probably related: bug 1201681, bug 1201632, bug 1201665, bug 1201664 May it be that spectre_v2=retpoline is the better choice regarding security? (spectre_v2=retpoline and spectre_v2=off work both for me) See: https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/spectre.html https://www.phoronix.com/scan.php?page=article&item=amd-retpoline-2022&num=1 https://unix.stackexchange.com/questions/617276/spectre-v2-retpoline-and-performance (In reply to Moritz Duge from comment #18) > May it be that spectre_v2=retpoline is the better choice regarding security? Regarding protection against which one of the CPU bugs and what machine? Same problem. CPU: Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz (Signature: Type 0, Family 6, Model 94, Stepping 3) Mainboard: HP MS-7957 (taken from a HP ProDesk 400 G3) RAM: 2x8GB GSkill F4-2133C15-8GNT Problem occurred with various BIOS versions. Downgrading kernel to .76 fixed it. (In reply to Alexander Kruppa from comment #21) > Same problem. > > CPU: Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz (Signature: Type 0, Family 6, > Model 94, Stepping 3) > Mainboard: HP MS-7957 (taken from a HP ProDesk 400 G3) > RAM: 2x8GB GSkill F4-2133C15-8GNT > > Problem occurred with various BIOS versions. Downgrading kernel to .76 fixed > it. Pls see comment #15. I'm seeing this as well while testing with Elemental on my Intel NUCs (spec:https://www.intel.com/content/www/us/en/products/sku/126147/intel-nuc-kit-nuc8i5bek/specifications.html) CPU: Intel Core i5 -- i58259u Disk: HP SSD EX920 1TB Memory: G.SKILL F4-2400C16-16GRS We have a build going in OBS with the test kernel so will update if that fixes on my hardware. SUSE-SU-2022:2549-1: An update that solves 11 vulnerabilities and has 49 fixes is now available. Category: security (important) Bug References: 1065729,1179195,1180814,1184924,1185762,1192761,1193629,1194013,1195504,1195775,1196901,1197362,1197754,1198020,1198924,1199482,1199487,1199489,1199657,1200217,1200263,1200343,1200442,1200571,1200599,1200600,1200604,1200605,1200608,1200619,1200622,1200692,1200806,1200807,1200809,1200810,1200813,1200816,1200820,1200821,1200822,1200825,1200828,1200829,1200925,1201050,1201080,1201143,1201147,1201149,1201160,1201171,1201177,1201193,1201222,1201644,1201664,1201672,1201673,1201676 CVE References: CVE-2021-26341,CVE-2021-4157,CVE-2022-1012,CVE-2022-1679,CVE-2022-20132,CVE-2022-20141,CVE-2022-20154,CVE-2022-29900,CVE-2022-29901,CVE-2022-33981,CVE-2022-34918 JIRA References: Sources used: openSUSE Leap 15.4 (src): dtb-aarch64-5.3.18-150300.59.87.1 openSUSE Leap 15.3 (src): dtb-aarch64-5.3.18-150300.59.87.1, kernel-64kb-5.3.18-150300.59.87.1, kernel-debug-5.3.18-150300.59.87.1, kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2, kernel-docs-5.3.18-150300.59.87.1, kernel-kvmsmall-5.3.18-150300.59.87.1, kernel-obs-build-5.3.18-150300.59.87.1, kernel-obs-qa-5.3.18-150300.59.87.1, kernel-preempt-5.3.18-150300.59.87.1, kernel-source-5.3.18-150300.59.87.1, kernel-syms-5.3.18-150300.59.87.1, kernel-zfcpdump-5.3.18-150300.59.87.1 SUSE Linux Enterprise Workstation Extension 15-SP3 (src): kernel-default-5.3.18-150300.59.87.1, kernel-preempt-5.3.18-150300.59.87.1 SUSE Linux Enterprise Module for Live Patching 15-SP3 (src): kernel-default-5.3.18-150300.59.87.1, kernel-livepatch-SLE15-SP3_Update_22-1-150300.7.5.1 SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src): kernel-default-5.3.18-150300.59.87.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): kernel-docs-5.3.18-150300.59.87.1, kernel-obs-build-5.3.18-150300.59.87.1, kernel-preempt-5.3.18-150300.59.87.1, kernel-source-5.3.18-150300.59.87.1, kernel-syms-5.3.18-150300.59.87.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): kernel-64kb-5.3.18-150300.59.87.1, kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2, kernel-preempt-5.3.18-150300.59.87.1, kernel-source-5.3.18-150300.59.87.1, kernel-zfcpdump-5.3.18-150300.59.87.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 SUSE Linux Enterprise High Availability 15-SP3 (src): kernel-default-5.3.18-150300.59.87.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. All SP3 fixes submitted, will be in the KOTD kernels starting tomorrow and soon in the official submission. Closing. Feel free to reopen if something's still not working as expected. Thx. SUSE-SU-2022:2720-1: An update that solves 7 vulnerabilities and has 18 fixes is now available. Category: security (important) Bug References: 1103269,1114648,1190812,1195775,1195926,1198484,1198829,1200442,1200598,1200644,1200651,1200910,1201196,1201381,1201429,1201635,1201636,1201644,1201651,1201742,1201752,1201930,1201940,1201954,1201958 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-36946 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP5 (src): kernel-azure-4.12.14-16.106.1, kernel-source-azure-4.12.14-16.106.1, kernel-syms-azure-4.12.14-16.106.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2719-1: An update that solves 7 vulnerabilities and has 16 fixes is now available. Category: security (important) Bug References: 1103269,1114648,1190812,1195775,1195926,1198484,1198829,1200442,1200598,1200644,1200651,1200910,1201196,1201381,1201429,1201635,1201636,1201644,1201651,1201930,1201940,1201954,1201958 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-36946 JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 12-SP5 (src): kernel-default-4.12.14-122.130.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): kernel-docs-4.12.14-122.130.2, kernel-obs-build-4.12.14-122.130.1 SUSE Linux Enterprise Server 12-SP5 (src): kernel-default-4.12.14-122.130.1, kernel-source-4.12.14-122.130.1, kernel-syms-4.12.14-122.130.1 SUSE Linux Enterprise Live Patching 12-SP5 (src): kernel-default-4.12.14-122.130.1, kgraft-patch-SLE12-SP5_Update_34-1-8.3.1 SUSE Linux Enterprise High Availability 12-SP5 (src): kernel-default-4.12.14-122.130.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2741-1: An update that solves 16 vulnerabilities, contains one feature and has 15 fixes is now available. Category: security (important) Bug References: 1178134,1198829,1199364,1199647,1199665,1199670,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201458,1201635,1201636,1201644,1201664,1201672,1201673,1201676,1201846,1201930,1201940,1201954,1201956,1201958 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-29581,CVE-2022-32250,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: openSUSE Leap 15.3 (src): kernel-azure-5.3.18-150300.38.75.1, kernel-source-azure-5.3.18-150300.38.75.1, kernel-syms-azure-5.3.18-150300.38.75.1 SUSE Linux Enterprise Module for Public Cloud 15-SP3 (src): kernel-azure-5.3.18-150300.38.75.1, kernel-source-azure-5.3.18-150300.38.75.1, kernel-syms-azure-5.3.18-150300.38.75.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. I encountered similar oops information during boot 15-SP3 kernel 5.3.18-150300.59.81-default on kvmskx1 and boot is hang. The latest kernel 5.3.18-150300.59.87-default can fix this issue. [ 29.943654] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 29.951429] #PF: supervisor instruction fetch in kernel mode [ 29.957745] #PF: error_code(0x0010) - not-present page [ 29.963479] PGD 0 P4D 0 [ 29.966307] Oops: 0010 [#1] SMP PTI [ 29.970202] CPU: 84 PID: 852 Comm: kworker/84:1 Not tainted 5.3.18-150300.59.81-default #1 SLE15-SP3 [ 29.980397] Hardware name: FUJITSU PRIMERGY RX4770 M4/D3753-A1, BIOS V5.0.0.12 R1.32.0 for D3753-A1x 04/06/2020 [ 29.993510] Workqueue: events work_for_cpu_fn [ 29.998375] RIP: 0010:0x0 [ 30.001301] Code: Bad RIP value. [ 30.004903] RSP: 0018:fffffe0001215ee0 EFLAGS: 00010046 [ 30.010736] RAX: 0000000000000005 RBX: ffff989b1f200000 RCX: 0000000000000048 [ 30.018702] RDX: 0000000000000000 RSI: ffffffffb5a018af RDI: ffff989b1f22cc80 [ 30.026666] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 30.034630] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 30.042594] R13: 0000000000000000 R14: 000000bd513fe004 R15: 0000000000000005 [ 30.050561] FS: 0000000000000000(0000) GS:ffff989b1f200000(0000) knlGS:0000000000000000 [ 30.059585] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.065989] CR2: ffffffffffffffd6 CR3: 000000bd513fe004 CR4: 00000000007706e0 [ 30.073955] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.081912] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.089875] PKRU: 55555554 [ 30.092893] Call Trace: [ 30.095622] <NMI> [ 30.097875] ? end_repeat_nmi+0x7/0x6d [ 30.102079] ? __mlx4_cmd+0x62b/0x9b0 [mlx4_core] [ 30.107337] ? __mlx4_cmd+0x62b/0x9b0 [mlx4_core] [ 30.112593] ? __mlx4_cmd+0x62b/0x9b0 [mlx4_core] [ 30.117843] </NMI> [ 30.120195] ? mlx4_RUN_FW+0x22/0x30 [mlx4_core] [ 30.125350] ? mlx4_load_one+0x444/0x14b0 [mlx4_core] [ 30.130995] ? mlx4_init_one+0x55e/0x770 [mlx4_core] [ 30.136543] ? local_pci_probe+0x42/0x90 [ 30.140920] ? work_for_cpu_fn+0x16/0x20 [ 30.145302] ? process_one_work+0x1f8/0x3e0 [ 30.149972] ? worker_thread+0x221/0x3f0 [ 30.154350] ? process_one_work+0x3e0/0x3e0 [ 30.159019] ? kthread+0x10d/0x130 [ 30.162815] ? kthread_park+0xb0/0xb0 [ 30.166901] ? ret_from_fork+0x1f/0x40 [ 30.171084] Modules linked in: pcc_cpufreq(-) intel_rapl_msr intel_rapl_common isst_if_common iTCO_wdt intel_pmc_bxt iTCO_vendor_support skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crc32_pclmul mgag200 i2c_algo_bit drm_kms_helper ghash_clmulni_intel qla2xxx(+) cec rc_core aesni_intel nvme_fc syscopyarea nvme_fabrics crypto_simd cryptd sysfillrect ipmi_ssif glue_helper mlx4_core(+) mei_me pcspkr nvme_core sysimgblt scsi_transport_fc i40e ioatdma joydev fb_sys_fops mei i2c_i801 lpc_ich dca ipmi_si ipmi_devintf ipmi_msghandler acpi_pad button drm fuse configfs btrfs libcrc32c xor raid6_pq hid_generic usbhid sd_mod t10_pi crc32c_intel xhci_pci xhci_hcd ahci libahci libata megaraid_sas usbcore wmi sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod [ 30.251315] Supported: Yes [ 30.254337] CR2: 0000000000000000 [ 30.258029] ---[ end trace d1852d73a1c349f7 ]--- SUSE-SU-2022:2809-1: An update that solves 22 vulnerabilities and has 19 fixes is now available. Category: security (important) Bug References: 1114648,1194013,1195478,1195775,1196472,1196901,1197362,1198829,1199487,1199489,1199647,1199648,1199657,1200263,1200442,1200571,1200599,1200604,1200605,1200608,1200619,1200692,1200762,1200905,1200910,1201050,1201080,1201251,1201429,1201458,1201635,1201636,1201644,1201664,1201672,1201673,1201676,1201742,1201752,1201930,1201940 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-26341,CVE-2021-33655,CVE-2021-33656,CVE-2021-4157,CVE-2022-1116,CVE-2022-1462,CVE-2022-1679,CVE-2022-20132,CVE-2022-20141,CVE-2022-20154,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-29900,CVE-2022-29901,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-33981,CVE-2022-36946 JIRA References: Sources used: SUSE Manager Server 4.1 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Manager Retail Branch Server 4.1 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Manager Proxy 4.1 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise Module for Live Patching 15-SP2 (src): kernel-default-5.3.18-150200.24.126.1, kernel-livepatch-SLE15-SP2_Update_29-1-150200.5.5.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise High Availability 15-SP2 (src): kernel-default-5.3.18-150200.24.126.1 SUSE Enterprise Storage 7 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2827-1: An update that solves 7 vulnerabilities and has 7 fixes is now available. Category: security (important) Bug References: 1195775,1195926,1198484,1198829,1200442,1200598,1200910,1201429,1201635,1201636,1201644,1201926,1201930,1201940 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-36946 JIRA References: Sources used: openSUSE Leap 15.4 (src): kernel-debug-4.12.14-150100.197.120.1, kernel-default-4.12.14-150100.197.120.1, kernel-kvmsmall-4.12.14-150100.197.120.1, kernel-vanilla-4.12.14-150100.197.120.1, kernel-zfcpdump-4.12.14-150100.197.120.1 openSUSE Leap 15.3 (src): kernel-debug-4.12.14-150100.197.120.1, kernel-default-4.12.14-150100.197.120.1, kernel-kvmsmall-4.12.14-150100.197.120.1, kernel-vanilla-4.12.14-150100.197.120.1, kernel-zfcpdump-4.12.14-150100.197.120.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1, kernel-zfcpdump-4.12.14-150100.197.120.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE Linux Enterprise Module for Live Patching 15-SP1 (src): kernel-default-4.12.14-150100.197.120.1, kernel-livepatch-SLE15-SP1_Update_33-1-150100.3.3.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE Linux Enterprise High Availability 15-SP1 (src): kernel-default-4.12.14-150100.197.120.1 SUSE Enterprise Storage 6 (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE CaaS Platform 4.0 (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2875-1: An update that solves 18 vulnerabilities, contains one feature and has 18 fixes is now available. Category: security (important) Bug References: 1178134,1196616,1198829,1199364,1199647,1199665,1199670,1200015,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201846,1201930,1201940,1201954,1201956,1201958,1202154 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-32250,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: openSUSE Leap 15.4 (src): dtb-aarch64-5.3.18-150300.59.90.1 openSUSE Leap 15.3 (src): dtb-aarch64-5.3.18-150300.59.90.1, kernel-64kb-5.3.18-150300.59.90.1, kernel-debug-5.3.18-150300.59.90.1, kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1, kernel-docs-5.3.18-150300.59.90.1, kernel-kvmsmall-5.3.18-150300.59.90.1, kernel-obs-build-5.3.18-150300.59.90.1, kernel-obs-qa-5.3.18-150300.59.90.1, kernel-preempt-5.3.18-150300.59.90.1, kernel-source-5.3.18-150300.59.90.1, kernel-syms-5.3.18-150300.59.90.1, kernel-zfcpdump-5.3.18-150300.59.90.1 SUSE Linux Enterprise Workstation Extension 15-SP3 (src): kernel-default-5.3.18-150300.59.90.1, kernel-preempt-5.3.18-150300.59.90.1 SUSE Linux Enterprise Module for Live Patching 15-SP3 (src): kernel-default-5.3.18-150300.59.90.1, kernel-livepatch-SLE15-SP3_Update_23-1-150300.7.3.1 SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src): kernel-default-5.3.18-150300.59.90.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): kernel-docs-5.3.18-150300.59.90.1, kernel-obs-build-5.3.18-150300.59.90.1, kernel-preempt-5.3.18-150300.59.90.1, kernel-source-5.3.18-150300.59.90.1, kernel-syms-5.3.18-150300.59.90.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): kernel-64kb-5.3.18-150300.59.90.1, kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1, kernel-preempt-5.3.18-150300.59.90.1, kernel-source-5.3.18-150300.59.90.1, kernel-zfcpdump-5.3.18-150300.59.90.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 SUSE Linux Enterprise High Availability 15-SP3 (src): kernel-default-5.3.18-150300.59.90.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2892-1: An update that solves 17 vulnerabilities, contains one feature and has 26 fixes is now available. Category: security (important) Bug References: 1178134,1196616,1196867,1198829,1199364,1199647,1199648,1199665,1199670,1199695,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201742,1201752,1201846,1201930,1201940,1201941,1201954,1201956,1201958,1202087,1202154,1202312 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: SUSE Linux Enterprise Module for Realtime 15-SP3 (src): kernel-rt-5.3.18-150300.99.1, kernel-rt_debug-5.3.18-150300.99.1, kernel-source-rt-5.3.18-150300.99.1, kernel-syms-rt-5.3.18-150300.99.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-rt-5.3.18-150300.99.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-rt-5.3.18-150300.99.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2910-1: An update that solves 10 vulnerabilities and has 26 fixes is now available. Category: security (important) Bug References: 1065729,1103269,1114648,1190812,1195775,1195926,1196616,1196867,1198484,1198829,1199665,1199695,1200442,1200598,1200644,1200651,1200910,1201019,1201196,1201381,1201429,1201635,1201636,1201644,1201651,1201705,1201742,1201752,1201930,1201940,1201941,1201954,1201958,1202087,1202154,1202312 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-2639,CVE-2022-29581,CVE-2022-36946 JIRA References: Sources used: SUSE Linux Enterprise Real Time Extension 12-SP5 (src): kernel-rt-4.12.14-10.97.1, kernel-rt_debug-4.12.14-10.97.1, kernel-source-rt-4.12.14-10.97.1, kernel-syms-rt-4.12.14-10.97.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. openSUSE-SU-2022:2549-1: An update that solves 11 vulnerabilities and has 49 fixes is now available. Category: security (important) Bug References: 1065729,1179195,1180814,1184924,1185762,1192761,1193629,1194013,1195504,1195775,1196901,1197362,1197754,1198020,1198924,1199482,1199487,1199489,1199657,1200217,1200263,1200343,1200442,1200571,1200599,1200600,1200604,1200605,1200608,1200619,1200622,1200692,1200806,1200807,1200809,1200810,1200813,1200816,1200820,1200821,1200822,1200825,1200828,1200829,1200925,1201050,1201080,1201143,1201147,1201149,1201160,1201171,1201177,1201193,1201222,1201644,1201664,1201672,1201673,1201676 CVE References: CVE-2021-26341,CVE-2021-4157,CVE-2022-1012,CVE-2022-1679,CVE-2022-20132,CVE-2022-20141,CVE-2022-20154,CVE-2022-29900,CVE-2022-29901,CVE-2022-33981,CVE-2022-34918 JIRA References: Sources used: openSUSE Leap Micro 5.2 (src): kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 SUSE-SU-2022:2892-2: An update that solves 17 vulnerabilities, contains one feature and has 26 fixes is now available. Category: security (important) Bug References: 1178134,1196616,1196867,1198829,1199364,1199647,1199648,1199665,1199670,1199695,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201742,1201752,1201846,1201930,1201940,1201941,1201954,1201956,1201958,1202087,1202154,1202312 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: openSUSE Leap Micro 5.2 (src): kernel-rt-5.3.18-150300.99.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2875-2: An update that solves 18 vulnerabilities, contains one feature and has 18 fixes is now available. Category: security (important) Bug References: 1178134,1196616,1198829,1199364,1199647,1199665,1199670,1200015,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201846,1201930,1201940,1201954,1201956,1201958,1202154 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-32250,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: openSUSE Leap Micro 5.2 (src): kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |