Comment # 18 on bug 1166632 from
SUSE-SU-2020:0836-1: An update that solves 5 vulnerabilities and has 58 fixes
is now available.

Category: security (important)
Bug References:
1044231,1051510,1051858,1056686,1060463,1065729,1103990,1103992,1104353,1104745,1109837,1111666,1111974,1112178,1112374,1113956,1114279,1114685,1119680,1127611,1133021,1134090,1136157,1141895,1144333,1146539,1156510,1157424,1158187,1159285,1160659,1161561,1161951,1162928,1162929,1162931,1164078,1164507,1165111,1165404,1165488,1165527,1165741,1165813,1165873,1165929,1165950,1165980,1165984,1165985,1166003,1166101,1166102,1166103,1166104,1166632,1166658,1166730,1166731,1166732,1166733,1166734,1166735
CVE References:
CVE-2019-19768,CVE-2020-8647,CVE-2020-8648,CVE-2020-8649,CVE-2020-9383
Sources used:
SUSE Linux Enterprise Workstation Extension 15-SP1 (src):   
kernel-default-4.12.14-197.37.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
(src):    kernel-debug-4.12.14-197.37.1, kernel-default-4.12.14-197.37.1,
kernel-docs-4.12.14-197.37.1, kernel-kvmsmall-4.12.14-197.37.1,
kernel-obs-qa-4.12.14-197.37.1, kernel-source-4.12.14-197.37.1,
kernel-vanilla-4.12.14-197.37.1, kernel-zfcpdump-4.12.14-197.37.1
SUSE Linux Enterprise Module for Live Patching 15-SP1 (src):   
kernel-default-4.12.14-197.37.1, kernel-livepatch-SLE15-SP1_Update_10-1-3.3.1
SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src):   
kernel-default-4.12.14-197.37.1
SUSE Linux Enterprise Module for Development Tools 15-SP1 (src):   
kernel-docs-4.12.14-197.37.1, kernel-obs-build-4.12.14-197.37.1,
kernel-source-4.12.14-197.37.1, kernel-syms-4.12.14-197.37.1
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):   
kernel-default-4.12.14-197.37.1, kernel-source-4.12.14-197.37.1,
kernel-zfcpdump-4.12.14-197.37.1
SUSE Linux Enterprise High Availability 15-SP1 (src):   
kernel-default-4.12.14-197.37.1

NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.


You are receiving this mail because: