Bug 1201644 - Kernel crashes on Dell PowerEdge R340 and R440 after latest kernel upgrade
Summary: Kernel crashes on Dell PowerEdge R340 and R440 after latest kernel upgrade
Status: RESOLVED FIXED
Alias: None
Product: openSUSE Distribution
Classification: openSUSE
Component: Kernel (show other bugs)
Version: Leap 15.3
Hardware: x86-64 openSUSE Leap 15.3
: P1 - Urgent : Critical (vote)
Target Milestone: ---
Assignee: Borislav Petkov
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-07-19 12:23 UTC by Ralf Ronneburger
Modified: 2022-09-01 18:05 UTC (History)
21 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
mhocko: needinfo? (r.ronneburger)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Ralf Ronneburger 2022-07-19 12:23:11 UTC
On several Dell PowerEdge Servers that ran without problems on 15.3 for a year we now have crashes on boot after upgrading to 5.3.18-150300.59.81.1. Sometimes it's barely possible to login before the kernel crashes. Booting with the last kernel (.76) works flawlessly.

Firmware- and BIOS Upgrades did not help to solve this.

The message before the crash in /var/log/messages on one machine is:

2022-07-19T13:39:27.440906+02:00 hostname kernel: [   50.541883] BUG: kernel NULL pointer dereference, address: 0000000000000000
2022-07-19T13:39:27.440917+02:00 hostname kernel: [   50.541887] #PF: supervisor instruction fetch in kernel mode
2022-07-19T13:39:27.440918+02:00 hostname kernel: [   50.541888] #PF: error_code(0x0010) - not-present page
2022-07-19T13:39:27.440919+02:00 hostname kernel: [   50.541890] PGD 0 P4D 0
2022-07-19T13:39:27.440919+02:00 hostname kernel: [   50.541891] Oops: 0010 [#2] SMP PTI
2022-07-19T13:39:27.440920+02:00 hostname kernel: [   50.541893] CPU: 0 PID: 6879 Comm: iptables Tainted: G      D        X  N 5.3.18-150300.59.81-default #1 SLE15-SP3
2022-07-19T13:39:27.440920+02:00 hostname kernel: [   50.541895] Hardware name: Dell Inc. PowerEdge R340/045M96, BIOS 2.9.1 03/23/2022
2022-07-19T13:39:27.440920+02:00 hostname kernel: [   50.541898] RIP: 0010:0x0
2022-07-19T13:39:27.440922+02:00 hostname kernel: [   50.541900] Code: Bad RIP value.
2022-07-19T13:39:27.440922+02:00 hostname kernel: [   50.541901] RSP: 0000:fffffe0000009ee0 EFLAGS: 00010046
2022-07-19T13:39:27.440922+02:00 hostname kernel: [   50.541903] RAX: 0000000000000001 RBX: ffff99f41e800000 RCX: 0000000000000048
2022-07-19T13:39:27.440923+02:00 hostname kernel: [   50.541904] RDX: 0000000000000000 RSI: ffffffffb9c018af RDI: 00005586ead591a0
2022-07-19T13:39:27.440923+02:00 hostname kernel: [   50.541906] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
2022-07-19T13:39:27.440924+02:00 hostname kernel: [   50.541907] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
2022-07-19T13:39:27.440924+02:00 hostname kernel: [   50.541909] R13: 0000000000000000 R14: 0000000858600001 R15: 0000000000000001
2022-07-19T13:39:27.440924+02:00 hostname kernel: [   50.541911] FS:  00007ffa5ea22440(0000) GS:ffff99f41e800000(0000) knlGS:0000000000000000
2022-07-19T13:39:27.440925+02:00 hostname kernel: [   50.541912] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
2022-07-19T13:39:27.440925+02:00 hostname kernel: [   50.541914] CR2: ffffffffffffffd6 CR3: 0000000858600001 CR4: 00000000003706f0
2022-07-19T13:39:27.440925+02:00 hostname kernel: [   50.541915] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
2022-07-19T13:39:27.440926+02:00 hostname kernel: [   50.541917] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
2022-07-19T13:39:27.440926+02:00 hostname kernel: [   50.541918] Call Trace:
2022-07-19T13:39:27.440926+02:00 hostname kernel: [   50.541920]  <NMI>
2022-07-19T13:39:27.440927+02:00 hostname kernel: [   50.541924]  ? end_repeat_nmi+0x7/0x6d
2022-07-19T13:39:27.440927+02:00 hostname kernel: [   50.541926]  ? page_fault+0x8/0x50
2022-07-19T13:39:27.440927+02:00 hostname kernel: [   50.541928]  </NMI>
2022-07-19T13:39:27.440928+02:00 hostname kernel: [   50.541929]  <ENTRY_TRAMPOLINE>
2022-07-19T13:39:27.440928+02:00 hostname kernel: [   50.541931]  ? error_entry+0x8b/0x150
2022-07-19T13:39:27.440928+02:00 hostname kernel: [   50.541933]  ? page_fault+0x8/0x50
2022-07-19T13:39:27.440929+02:00 hostname kernel: [   50.541935]  </ENTRY_TRAMPOLINE>
2022-07-19T13:39:27.440929+02:00 hostname kernel: [   50.541936] Modules linked in: xt_policy xt_recent nf_log_ipv6 xt_MASQUERADE xt_limit xt_nat nf_log_ipv4 nf_log_common iptable_nat xt_LOG mpt3sas raid_class scfkill xt_pkttype xt_tcpudp ip6t_REJECT ipt_REJECT iptable_filter bpfilter ip6table_mangle nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp ip_tables xt_conntrack nf_conntrack nf_(X) dmi_sysfs msr intel_rapl_msr intel_rapl_common intel_pmc_core_pltdrv(N) intel_pmc_core x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iTCO_wdt intel_pmc_bxt iTCO_vendor_support kvm dcdbas(X) mgag20_kms_helper idma64 aesni_intel tg3 cec rc_core cdc_ether syscopyarea usbnet crypto_simd mei_me cryptd sysfillrect sysimgblt mii intel_lpss_pci i40e pcspkr fb_sys_fops libphy i2c_i801 ipmi_si glue_helper
2022-07-19T13:39:27.440930+02:00 hostname kernel: [   50.541953]  intel_lpss mei ipmi_devintf ipmi_msghandler intel_pch_thermal ie31200_edac ac button fuse drm configfs btrfs libcrc32c xor raid6_pq sd_mod t10_pi  video pinctrl_cannonlake sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod
2022-07-19T13:39:27.440930+02:00 hostname kernel: [   50.541975] Supported: No, Unsupported modules are loaded
2022-07-19T13:39:27.440930+02:00 hostname kernel: [   50.541977] CR2: 0000000000000000
2022-07-19T13:39:27.440931+02:00 hostname kernel: [   50.541978] ---[ end trace 929840a74a61d4f6 ]---
2022-07-19T13:39:27.440931+02:00 hostname kernel: [   50.544609] RIP: 0010:0x0
2022-07-19T13:39:27.440931+02:00 hostname kernel: [   50.544612] Code: Bad RIP value.
2022-07-19T13:39:27.440932+02:00 hostname kernel: [   50.544613] RSP: 0018:fffffe000018aee0 EFLAGS: 00010046
2022-07-19T13:39:27.440932+02:00 hostname kernel: [   50.544615] RAX: 0000000000000001 RBX: ffff99f41e9c0000 RCX: 0000000000000048
2022-07-19T13:39:27.440932+02:00 hostname kernel: [   50.544617] RDX: 0000000000000000 RSI: ffffffffb9c018af RDI: ffff99ecc7152800
2022-07-19T13:39:27.440933+02:00 hostname kernel: [   50.544618] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
2022-07-19T13:39:27.440933+02:00 hostname kernel: [   50.544620] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
2022-07-19T13:39:27.440933+02:00 hostname kernel: [   50.544621] R13: 0000000000000000 R14: 0000000847cd8005 R15: 0000000000000001
2022-07-19T13:39:27.440934+02:00 hostname kernel: [   50.544623] FS:  00007ffa5ea22440(0000) GS:ffff99f41e800000(0000) knlGS:0000000000000000
2022-07-19T13:39:27.440934+02:00 hostname kernel: [   50.544625] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
2022-07-19T13:39:27.440934+02:00 hostname kernel: [   50.544626] CR2: ffffffffffffffd6 CR3: 0000000858600001 CR4: 00000000003706f0
2022-07-19T13:39:27.440934+02:00 hostname kernel: [   50.544642] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
2022-07-19T13:39:27.440935+02:00 hostname kernel: [   50.544643] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Comment 1 Klaus Braun 2022-07-19 12:58:37 UTC
Same here on HP Z 240. Working with kernel 5.3.18-150300.59.81.1 is not possible, booting with 5.3.18-150300.59.76.1 seems to be ok. 

During first boot after upgrade to 5.3.18-150300.59.81.1 purge old kernels takes much longer than expected and obviously didn't succeed:

2022-07-19T11:26:14.838055+02:00 localhost zypper[1165]: (5/5) Removing kernel-default-5.3.18-150300.59.71.2.x86_64 [....error]
2022-07-19T11:26:14.838102+02:00 localhost zypper[1165]: Removal of (604)kernel-default-5.3.18-150300.59.71.2.x86_64(@System) failed:
2022-07-19T11:26:14.838144+02:00 localhost zypper[1165]: Error: Subprocess failed. Error: RPM failed: Command was killed by signal 9 (Killed; Out of memory?).
2022-07-19T11:26:14.838183+02:00 localhost zypper[1165]: Abort, retry, ignore? [a/r/i] (a): a
2022-07-19T11:26:14.839147+02:00 localhost zypper[1165]: Problem occurred during or after installation or removal of packages:
2022-07-19T11:26:14.839190+02:00 localhost zypper[1165]: Installation has been aborted as directed.
2022-07-19T11:26:14.839226+02:00 localhost zypper[1165]: Please see the above error message for a hint.
2022-07-19T11:26:14.857411+02:00 localhost systemd[1]: purge-kernels.service: Succeeded.
2022-07-19T11:26:14.857509+02:00 localhost systemd[1]: Finished Purge old kernels.


And here the messages about the BUG: kernel NULL pointer dereference:


2022-07-19T11:27:09.640166+02:00 localhost kernel: [  105.811063] BUG: kernel NULL pointer dereference, address: 0000000000000000
2022-07-19T11:27:09.640176+02:00 localhost kernel: [  105.811067] #PF: supervisor instruction fetch in kernel mode
2022-07-19T11:27:09.640177+02:00 localhost kernel: [  105.811068] #PF: error_code(0x0010) - not-present page
2022-07-19T11:27:09.640178+02:00 localhost kernel: [  105.811070] PGD 0 P4D 0 
2022-07-19T11:27:09.640178+02:00 localhost kernel: [  105.811072] Oops: 0010 [#3] SMP PTI
2022-07-19T11:27:09.640178+02:00 localhost kernel: [  105.811074] CPU: 7 PID: 14589 Comm: single Tainted: P      D    OE  X  N 5.3.18-150300.59.81-default #1 SLE15-SP3
2022-07-19T11:27:09.640179+02:00 localhost kernel: [  105.811076] Hardware name: HP HP Z240 Tower Workstation/802F, BIOS N51 Ver. 01.63 10/05/2017
Comment 2 Achim Mildenberger 2022-07-19 15:10:51 UTC
Same here on a simple desktop (Fujitsu P958) with kernel 5.3.18-150300.59.81: crashes after some minutes.
Reverting to previous kernel (5.3.18-150300.59.76): ok.
Comment 3 Michal Hocko 2022-07-19 16:16:29 UTC
Could you provide the full kernel log please?

Boris, faulting from the asm glue code sounds suspicious and it would suggest recent RetBleed related changes. Could you have a look please?
Comment 4 Borislav Petkov 2022-07-19 16:41:56 UTC
Does booting with spectre_v2=off fix the problems?
Comment 5 Borislav Petkov 2022-07-19 19:18:27 UTC
Ok, it is probably semi-stab in the dark but can folks try this kernel:

https://download.opensuse.org/repositories/home:/bpetkov:/15sp3/pool/

?

Thx.
Comment 6 Frank Steiner 2022-07-19 20:38:35 UTC
Same here for our Dell R540, but also for HP AIO 800G3. This is a nightmare!
Comment 7 Frank Steiner 2022-07-19 20:39:42 UTC
Oh, and this is for the kernel released for SLES and SLED 15 sp3.
Comment 8 Frank Steiner 2022-07-19 20:57:04 UTC
spectre_v2=off seems to fix the problem, at least I could boot our main Dell 540 with it that paniced consequently before. Before I came here I've opened a SR with SuSE support (no. 00355361) which contains a dmesg output from a HP AIO that I could collect before it crashed, as well as a screenlog from the full boot process of the Dell 540. I won't post them here in case they contain sensitive information, but you should be able to access them internally I guess.
Comment 9 Frank Steiner 2022-07-19 23:48:54 UTC
If that helps: all the failing Dell R540 are the same generation and 1.5 years older than those who boot fine with the new kernel. The failing ones have CPU Intel Xeon Silver 4110 or 4112, the working ones have Silver 4210/12/14.
Similar for the HP desktops. The failing ones are 800 G3, the working ones 800 G5. Failing CPUs are Intel Core i7-7700, working ones are i7-9700.
Comment 10 Borislav Petkov 2022-07-20 06:47:52 UTC
Thanks.

You can use the temporary workaround for the time being. I was able to reproduce here and am debugging.
Comment 11 Achim Mildenberger 2022-07-20 09:01:11 UTC
May I just ask: 
Is kernel-*-5.3.18-150300.59.81.1 *still* in the repos and offered to openSuSE 15.3 systems? 
To me it looks like this.
Comment 12 Volker Koehne 2022-07-20 09:57:03 UTC
Same problem here: Dell XPS 8960 Intel i7-8700, OpenSuse leap 15-3 (all mandatory patches installed).
kernel hangs after ~5minutes.

Older kernel -76 is stable.
Comment 13 Marcus Meissner 2022-07-20 12:18:43 UTC
the kernel is now marked as retracted.

(meaning it is still on the servers, but will no longer be offered during zypper up or zypper patch.)

I replacement / fixed kernel is being worked on.
Comment 14 Henk van Velden 2022-07-20 15:17:56 UTC
Thanks for the solution.

BTW it is not restricted to DELL systems. I have problems of the kind on a HP Pavilion.
Comment 15 Borislav Petkov 2022-07-20 17:22:11 UTC
Ok, new kernel here:

https://download.opensuse.org/repositories/home:/bpetkov:/15sp3/pool/

Pls test.

Thx.
Comment 16 Frank Steiner 2022-07-20 18:03:05 UTC
I could test one HP AIO 800 G3 which doesn't show any kernel oops and still runs after 45 minutes. And one Dell R540 that did always crash during boot and now reaches multi-user.target and is still running after some minutes, also without any oops in dmesg.

So, wrt this very small test set, your kernel seems to work fine!
Comment 17 Borislav Petkov 2022-07-20 18:30:50 UTC
Thanks for testing! Lemme know should you see any hickups in the coming days.
Comment 18 Moritz Duge 2022-07-20 18:54:47 UTC
Probably related: bug 1201681, bug 1201632, bug 1201665, bug 1201664

May it be that spectre_v2=retpoline is the better choice regarding security?
(spectre_v2=retpoline and spectre_v2=off work both for me)

See:
​https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/spectre.htmlhttps://www.phoronix.com/scan.php?page=article&item=amd-retpoline-2022&num=1https://unix.stackexchange.com/questions/617276/spectre-v2-retpoline-and-performance
Comment 19 Borislav Petkov 2022-07-20 19:34:28 UTC
(In reply to Moritz Duge from comment #18)
> May it be that spectre_v2=retpoline is the better choice regarding security?

Regarding protection against which one of the CPU bugs and what machine?
Comment 21 Alexander Kruppa 2022-07-21 16:09:45 UTC
Same problem.

CPU: Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz (Signature: Type 0, Family 6, Model 94, Stepping 3)
Mainboard: HP MS-7957 (taken from a HP ProDesk 400 G3)
RAM: 2x8GB GSkill F4-2133C15-8GNT

Problem occurred with various BIOS versions. Downgrading kernel to .76 fixed it.
Comment 22 Borislav Petkov 2022-07-21 16:30:16 UTC
(In reply to Alexander Kruppa from comment #21)
> Same problem.
> 
> CPU: Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz (Signature: Type 0, Family 6,
> Model 94, Stepping 3)
> Mainboard: HP MS-7957 (taken from a HP ProDesk 400 G3)
> RAM: 2x8GB GSkill F4-2133C15-8GNT
> 
> Problem occurred with various BIOS versions. Downgrading kernel to .76 fixed
> it.

Pls see comment #15.
Comment 26 Andrew Gracey 2022-07-25 18:14:40 UTC
I'm seeing this as well while testing with Elemental on my Intel NUCs (spec:https://www.intel.com/content/www/us/en/products/sku/126147/intel-nuc-kit-nuc8i5bek/specifications.html)

CPU: Intel Core i5 -- i58259u
Disk: HP SSD EX920 1TB
Memory: G.SKILL F4-2400C16-16GRS

We have a build going in OBS with the test kernel so will update if that fixes on my hardware.
Comment 27 Swamp Workflow Management 2022-07-26 16:23:59 UTC
SUSE-SU-2022:2549-1: An update that solves 11 vulnerabilities and has 49 fixes is now available.

Category: security (important)
Bug References: 1065729,1179195,1180814,1184924,1185762,1192761,1193629,1194013,1195504,1195775,1196901,1197362,1197754,1198020,1198924,1199482,1199487,1199489,1199657,1200217,1200263,1200343,1200442,1200571,1200599,1200600,1200604,1200605,1200608,1200619,1200622,1200692,1200806,1200807,1200809,1200810,1200813,1200816,1200820,1200821,1200822,1200825,1200828,1200829,1200925,1201050,1201080,1201143,1201147,1201149,1201160,1201171,1201177,1201193,1201222,1201644,1201664,1201672,1201673,1201676
CVE References: CVE-2021-26341,CVE-2021-4157,CVE-2022-1012,CVE-2022-1679,CVE-2022-20132,CVE-2022-20141,CVE-2022-20154,CVE-2022-29900,CVE-2022-29901,CVE-2022-33981,CVE-2022-34918
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    dtb-aarch64-5.3.18-150300.59.87.1
openSUSE Leap 15.3 (src):    dtb-aarch64-5.3.18-150300.59.87.1, kernel-64kb-5.3.18-150300.59.87.1, kernel-debug-5.3.18-150300.59.87.1, kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2, kernel-docs-5.3.18-150300.59.87.1, kernel-kvmsmall-5.3.18-150300.59.87.1, kernel-obs-build-5.3.18-150300.59.87.1, kernel-obs-qa-5.3.18-150300.59.87.1, kernel-preempt-5.3.18-150300.59.87.1, kernel-source-5.3.18-150300.59.87.1, kernel-syms-5.3.18-150300.59.87.1, kernel-zfcpdump-5.3.18-150300.59.87.1
SUSE Linux Enterprise Workstation Extension 15-SP3 (src):    kernel-default-5.3.18-150300.59.87.1, kernel-preempt-5.3.18-150300.59.87.1
SUSE Linux Enterprise Module for Live Patching 15-SP3 (src):    kernel-default-5.3.18-150300.59.87.1, kernel-livepatch-SLE15-SP3_Update_22-1-150300.7.5.1
SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src):    kernel-default-5.3.18-150300.59.87.1
SUSE Linux Enterprise Module for Development Tools 15-SP3 (src):    kernel-docs-5.3.18-150300.59.87.1, kernel-obs-build-5.3.18-150300.59.87.1, kernel-preempt-5.3.18-150300.59.87.1, kernel-source-5.3.18-150300.59.87.1, kernel-syms-5.3.18-150300.59.87.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    kernel-64kb-5.3.18-150300.59.87.1, kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2, kernel-preempt-5.3.18-150300.59.87.1, kernel-source-5.3.18-150300.59.87.1, kernel-zfcpdump-5.3.18-150300.59.87.1
SUSE Linux Enterprise Micro 5.2 (src):    kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2
SUSE Linux Enterprise Micro 5.1 (src):    kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2
SUSE Linux Enterprise High Availability 15-SP3 (src):    kernel-default-5.3.18-150300.59.87.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 28 Borislav Petkov 2022-08-01 11:34:09 UTC
All SP3 fixes submitted, will be in the KOTD kernels starting tomorrow
and soon in the official submission.

Closing. Feel free to reopen if something's still not working as expected.

Thx.
Comment 36 Swamp Workflow Management 2022-08-09 16:20:19 UTC
SUSE-SU-2022:2720-1: An update that solves 7 vulnerabilities and has 18 fixes is now available.

Category: security (important)
Bug References: 1103269,1114648,1190812,1195775,1195926,1198484,1198829,1200442,1200598,1200644,1200651,1200910,1201196,1201381,1201429,1201635,1201636,1201644,1201651,1201742,1201752,1201930,1201940,1201954,1201958
CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-36946
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    kernel-azure-4.12.14-16.106.1, kernel-source-azure-4.12.14-16.106.1, kernel-syms-azure-4.12.14-16.106.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 37 Swamp Workflow Management 2022-08-09 16:26:22 UTC
SUSE-SU-2022:2719-1: An update that solves 7 vulnerabilities and has 16 fixes is now available.

Category: security (important)
Bug References: 1103269,1114648,1190812,1195775,1195926,1198484,1198829,1200442,1200598,1200644,1200651,1200910,1201196,1201381,1201429,1201635,1201636,1201644,1201651,1201930,1201940,1201954,1201958
CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-36946
JIRA References: 
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP5 (src):    kernel-default-4.12.14-122.130.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    kernel-docs-4.12.14-122.130.2, kernel-obs-build-4.12.14-122.130.1
SUSE Linux Enterprise Server 12-SP5 (src):    kernel-default-4.12.14-122.130.1, kernel-source-4.12.14-122.130.1, kernel-syms-4.12.14-122.130.1
SUSE Linux Enterprise Live Patching 12-SP5 (src):    kernel-default-4.12.14-122.130.1, kgraft-patch-SLE12-SP5_Update_34-1-8.3.1
SUSE Linux Enterprise High Availability 12-SP5 (src):    kernel-default-4.12.14-122.130.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 38 Swamp Workflow Management 2022-08-10 13:18:45 UTC
SUSE-SU-2022:2741-1: An update that solves 16 vulnerabilities, contains one feature and has 15 fixes is now available.

Category: security (important)
Bug References: 1178134,1198829,1199364,1199647,1199665,1199670,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201458,1201635,1201636,1201644,1201664,1201672,1201673,1201676,1201846,1201930,1201940,1201954,1201956,1201958
CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-29581,CVE-2022-32250,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946
JIRA References: SLE-24559
Sources used:
openSUSE Leap 15.3 (src):    kernel-azure-5.3.18-150300.38.75.1, kernel-source-azure-5.3.18-150300.38.75.1, kernel-syms-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15-SP3 (src):    kernel-azure-5.3.18-150300.38.75.1, kernel-source-azure-5.3.18-150300.38.75.1, kernel-syms-azure-5.3.18-150300.38.75.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 39 Dawei Pang 2022-08-11 12:34:11 UTC
I encountered similar oops information during boot 15-SP3 kernel 5.3.18-150300.59.81-default on kvmskx1 and boot is hang.
The latest kernel 5.3.18-150300.59.87-default can fix this issue.

[   29.943654] BUG: kernel NULL pointer dereference, address: 0000000000000000
[   29.951429] #PF: supervisor instruction fetch in kernel mode
[   29.957745] #PF: error_code(0x0010) - not-present page
[   29.963479] PGD 0 P4D 0 
[   29.966307] Oops: 0010 [#1] SMP PTI
[   29.970202] CPU: 84 PID: 852 Comm: kworker/84:1 Not tainted 5.3.18-150300.59.81-default #1 SLE15-SP3
[   29.980397] Hardware name: FUJITSU PRIMERGY RX4770 M4/D3753-A1, BIOS V5.0.0.12 R1.32.0 for D3753-A1x                    04/06/2020
[   29.993510] Workqueue: events work_for_cpu_fn
[   29.998375] RIP: 0010:0x0
[   30.001301] Code: Bad RIP value.
[   30.004903] RSP: 0018:fffffe0001215ee0 EFLAGS: 00010046
[   30.010736] RAX: 0000000000000005 RBX: ffff989b1f200000 RCX: 0000000000000048
[   30.018702] RDX: 0000000000000000 RSI: ffffffffb5a018af RDI: ffff989b1f22cc80
[   30.026666] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[   30.034630] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[   30.042594] R13: 0000000000000000 R14: 000000bd513fe004 R15: 0000000000000005
[   30.050561] FS:  0000000000000000(0000) GS:ffff989b1f200000(0000) knlGS:0000000000000000
[   30.059585] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   30.065989] CR2: ffffffffffffffd6 CR3: 000000bd513fe004 CR4: 00000000007706e0
[   30.073955] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   30.081912] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   30.089875] PKRU: 55555554
[   30.092893] Call Trace:
[   30.095622]  <NMI>
[   30.097875]  ? end_repeat_nmi+0x7/0x6d
[   30.102079]  ? __mlx4_cmd+0x62b/0x9b0 [mlx4_core]
[   30.107337]  ? __mlx4_cmd+0x62b/0x9b0 [mlx4_core]
[   30.112593]  ? __mlx4_cmd+0x62b/0x9b0 [mlx4_core]
[   30.117843]  </NMI>
[   30.120195]  ? mlx4_RUN_FW+0x22/0x30 [mlx4_core]
[   30.125350]  ? mlx4_load_one+0x444/0x14b0 [mlx4_core]
[   30.130995]  ? mlx4_init_one+0x55e/0x770 [mlx4_core]
[   30.136543]  ? local_pci_probe+0x42/0x90
[   30.140920]  ? work_for_cpu_fn+0x16/0x20
[   30.145302]  ? process_one_work+0x1f8/0x3e0
[   30.149972]  ? worker_thread+0x221/0x3f0
[   30.154350]  ? process_one_work+0x3e0/0x3e0
[   30.159019]  ? kthread+0x10d/0x130
[   30.162815]  ? kthread_park+0xb0/0xb0
[   30.166901]  ? ret_from_fork+0x1f/0x40
[   30.171084] Modules linked in: pcc_cpufreq(-) intel_rapl_msr intel_rapl_common isst_if_common iTCO_wdt intel_pmc_bxt iTCO_vendor_support skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crc32_pclmul mgag200 i2c_algo_bit drm_kms_helper ghash_clmulni_intel qla2xxx(+) cec rc_core aesni_intel nvme_fc syscopyarea nvme_fabrics crypto_simd cryptd sysfillrect ipmi_ssif glue_helper mlx4_core(+) mei_me pcspkr nvme_core sysimgblt scsi_transport_fc i40e ioatdma joydev fb_sys_fops mei i2c_i801 lpc_ich dca ipmi_si ipmi_devintf ipmi_msghandler acpi_pad button drm fuse configfs btrfs libcrc32c xor raid6_pq hid_generic usbhid sd_mod t10_pi crc32c_intel xhci_pci xhci_hcd ahci libahci libata megaraid_sas usbcore wmi sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod
[   30.251315] Supported: Yes
[   30.254337] CR2: 0000000000000000
[   30.258029] ---[ end trace d1852d73a1c349f7 ]---
Comment 40 Swamp Workflow Management 2022-08-15 22:19:52 UTC
SUSE-SU-2022:2809-1: An update that solves 22 vulnerabilities and has 19 fixes is now available.

Category: security (important)
Bug References: 1114648,1194013,1195478,1195775,1196472,1196901,1197362,1198829,1199487,1199489,1199647,1199648,1199657,1200263,1200442,1200571,1200599,1200604,1200605,1200608,1200619,1200692,1200762,1200905,1200910,1201050,1201080,1201251,1201429,1201458,1201635,1201636,1201644,1201664,1201672,1201673,1201676,1201742,1201752,1201930,1201940
CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-26341,CVE-2021-33655,CVE-2021-33656,CVE-2021-4157,CVE-2022-1116,CVE-2022-1462,CVE-2022-1679,CVE-2022-20132,CVE-2022-20141,CVE-2022-20154,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-29900,CVE-2022-29901,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-33981,CVE-2022-36946
JIRA References: 
Sources used:
SUSE Manager Server 4.1 (src):    kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1
SUSE Manager Retail Branch Server 4.1 (src):    kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1
SUSE Manager Proxy 4.1 (src):    kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1
SUSE Linux Enterprise Module for Live Patching 15-SP2 (src):    kernel-default-5.3.18-150200.24.126.1, kernel-livepatch-SLE15-SP2_Update_29-1-150200.5.5.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1
SUSE Linux Enterprise High Availability 15-SP2 (src):    kernel-default-5.3.18-150200.24.126.1
SUSE Enterprise Storage 7 (src):    kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 41 Swamp Workflow Management 2022-08-16 19:16:48 UTC
SUSE-SU-2022:2827-1: An update that solves 7 vulnerabilities and has 7 fixes is now available.

Category: security (important)
Bug References: 1195775,1195926,1198484,1198829,1200442,1200598,1200910,1201429,1201635,1201636,1201644,1201926,1201930,1201940
CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-36946
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    kernel-debug-4.12.14-150100.197.120.1, kernel-default-4.12.14-150100.197.120.1, kernel-kvmsmall-4.12.14-150100.197.120.1, kernel-vanilla-4.12.14-150100.197.120.1, kernel-zfcpdump-4.12.14-150100.197.120.1
openSUSE Leap 15.3 (src):    kernel-debug-4.12.14-150100.197.120.1, kernel-default-4.12.14-150100.197.120.1, kernel-kvmsmall-4.12.14-150100.197.120.1, kernel-vanilla-4.12.14-150100.197.120.1, kernel-zfcpdump-4.12.14-150100.197.120.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1, kernel-zfcpdump-4.12.14-150100.197.120.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1
SUSE Linux Enterprise Module for Live Patching 15-SP1 (src):    kernel-default-4.12.14-150100.197.120.1, kernel-livepatch-SLE15-SP1_Update_33-1-150100.3.3.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1
SUSE Linux Enterprise High Availability 15-SP1 (src):    kernel-default-4.12.14-150100.197.120.1
SUSE Enterprise Storage 6 (src):    kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1
SUSE CaaS Platform 4.0 (src):    kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 44 Swamp Workflow Management 2022-08-23 16:22:00 UTC
SUSE-SU-2022:2875-1: An update that solves 18 vulnerabilities, contains one feature and has 18 fixes is now available.

Category: security (important)
Bug References: 1178134,1196616,1198829,1199364,1199647,1199665,1199670,1200015,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201846,1201930,1201940,1201954,1201956,1201958,1202154
CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-32250,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946
JIRA References: SLE-24559
Sources used:
openSUSE Leap 15.4 (src):    dtb-aarch64-5.3.18-150300.59.90.1
openSUSE Leap 15.3 (src):    dtb-aarch64-5.3.18-150300.59.90.1, kernel-64kb-5.3.18-150300.59.90.1, kernel-debug-5.3.18-150300.59.90.1, kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1, kernel-docs-5.3.18-150300.59.90.1, kernel-kvmsmall-5.3.18-150300.59.90.1, kernel-obs-build-5.3.18-150300.59.90.1, kernel-obs-qa-5.3.18-150300.59.90.1, kernel-preempt-5.3.18-150300.59.90.1, kernel-source-5.3.18-150300.59.90.1, kernel-syms-5.3.18-150300.59.90.1, kernel-zfcpdump-5.3.18-150300.59.90.1
SUSE Linux Enterprise Workstation Extension 15-SP3 (src):    kernel-default-5.3.18-150300.59.90.1, kernel-preempt-5.3.18-150300.59.90.1
SUSE Linux Enterprise Module for Live Patching 15-SP3 (src):    kernel-default-5.3.18-150300.59.90.1, kernel-livepatch-SLE15-SP3_Update_23-1-150300.7.3.1
SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src):    kernel-default-5.3.18-150300.59.90.1
SUSE Linux Enterprise Module for Development Tools 15-SP3 (src):    kernel-docs-5.3.18-150300.59.90.1, kernel-obs-build-5.3.18-150300.59.90.1, kernel-preempt-5.3.18-150300.59.90.1, kernel-source-5.3.18-150300.59.90.1, kernel-syms-5.3.18-150300.59.90.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    kernel-64kb-5.3.18-150300.59.90.1, kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1, kernel-preempt-5.3.18-150300.59.90.1, kernel-source-5.3.18-150300.59.90.1, kernel-zfcpdump-5.3.18-150300.59.90.1
SUSE Linux Enterprise Micro 5.2 (src):    kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1
SUSE Linux Enterprise Micro 5.1 (src):    kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1
SUSE Linux Enterprise High Availability 15-SP3 (src):    kernel-default-5.3.18-150300.59.90.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 45 Swamp Workflow Management 2022-08-25 13:22:23 UTC
SUSE-SU-2022:2892-1: An update that solves 17 vulnerabilities, contains one feature and has 26 fixes is now available.

Category: security (important)
Bug References: 1178134,1196616,1196867,1198829,1199364,1199647,1199648,1199665,1199670,1199695,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201742,1201752,1201846,1201930,1201940,1201941,1201954,1201956,1201958,1202087,1202154,1202312
CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946
JIRA References: SLE-24559
Sources used:
SUSE Linux Enterprise Module for Realtime 15-SP3 (src):    kernel-rt-5.3.18-150300.99.1, kernel-rt_debug-5.3.18-150300.99.1, kernel-source-rt-5.3.18-150300.99.1, kernel-syms-rt-5.3.18-150300.99.1
SUSE Linux Enterprise Micro 5.2 (src):    kernel-rt-5.3.18-150300.99.1
SUSE Linux Enterprise Micro 5.1 (src):    kernel-rt-5.3.18-150300.99.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 46 Swamp Workflow Management 2022-08-26 13:18:23 UTC
SUSE-SU-2022:2910-1: An update that solves 10 vulnerabilities and has 26 fixes is now available.

Category: security (important)
Bug References: 1065729,1103269,1114648,1190812,1195775,1195926,1196616,1196867,1198484,1198829,1199665,1199695,1200442,1200598,1200644,1200651,1200910,1201019,1201196,1201381,1201429,1201635,1201636,1201644,1201651,1201705,1201742,1201752,1201930,1201940,1201941,1201954,1201958,1202087,1202154,1202312
CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-2639,CVE-2022-29581,CVE-2022-36946
JIRA References: 
Sources used:
SUSE Linux Enterprise Real Time Extension 12-SP5 (src):    kernel-rt-4.12.14-10.97.1, kernel-rt_debug-4.12.14-10.97.1, kernel-source-rt-4.12.14-10.97.1, kernel-syms-rt-4.12.14-10.97.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 47 Swamp Workflow Management 2022-09-01 14:01:57 UTC
openSUSE-SU-2022:2549-1: An update that solves 11 vulnerabilities and has 49 fixes is now available.

Category: security (important)
Bug References: 1065729,1179195,1180814,1184924,1185762,1192761,1193629,1194013,1195504,1195775,1196901,1197362,1197754,1198020,1198924,1199482,1199487,1199489,1199657,1200217,1200263,1200343,1200442,1200571,1200599,1200600,1200604,1200605,1200608,1200619,1200622,1200692,1200806,1200807,1200809,1200810,1200813,1200816,1200820,1200821,1200822,1200825,1200828,1200829,1200925,1201050,1201080,1201143,1201147,1201149,1201160,1201171,1201177,1201193,1201222,1201644,1201664,1201672,1201673,1201676
CVE References: CVE-2021-26341,CVE-2021-4157,CVE-2022-1012,CVE-2022-1679,CVE-2022-20132,CVE-2022-20141,CVE-2022-20154,CVE-2022-29900,CVE-2022-29901,CVE-2022-33981,CVE-2022-34918
JIRA References: 
Sources used:
openSUSE Leap Micro 5.2 (src):    kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2
Comment 48 Swamp Workflow Management 2022-09-01 15:05:11 UTC
SUSE-SU-2022:2892-2: An update that solves 17 vulnerabilities, contains one feature and has 26 fixes is now available.

Category: security (important)
Bug References: 1178134,1196616,1196867,1198829,1199364,1199647,1199648,1199665,1199670,1199695,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201742,1201752,1201846,1201930,1201940,1201941,1201954,1201956,1201958,1202087,1202154,1202312
CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946
JIRA References: SLE-24559
Sources used:
openSUSE Leap Micro 5.2 (src):    kernel-rt-5.3.18-150300.99.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 49 Swamp Workflow Management 2022-09-01 15:24:06 UTC
SUSE-SU-2022:2875-2: An update that solves 18 vulnerabilities, contains one feature and has 18 fixes is now available.

Category: security (important)
Bug References: 1178134,1196616,1198829,1199364,1199647,1199665,1199670,1200015,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201846,1201930,1201940,1201954,1201956,1201958,1202154
CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-32250,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946
JIRA References: SLE-24559
Sources used:
openSUSE Leap Micro 5.2 (src):    kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.