Bug 1140228 - system will panic when 82599 enable vf
system will panic when 82599 enable vf
Status: RESOLVED FIXED
Classification: SUSE Linux Enterprise Server
Product: Beta SUSE Linux Enterprise Server 12 SP5
Classification: SUSE Linux Enterprise Server
Component: Basesystem
Beta 1
aarch64 SLES 12
: P5 - None : Normal
: ---
Assigned To: Thomas Bogendoerfer
E-mail List
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-07-03 10:47 UTC by tian tao
Modified: 2019-09-23 14:45 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description tian tao 2019-07-03 10:47:35 UTC
We found a 82599 ipsec bug on 12.5. Requires community  patch https://patchwork.ozlabs.org/patch/1104448/ to fix.


suse-42:~ # lspci -tv 
-+-[0000:bc]---00.0-[bd]--+-00.0  Huawei Technologies Co., Ltd. Device a222
 |                        +-00.1  Huawei Technologies Co., Ltd. Device a221
 |                        +-00.2  Huawei Technologies Co., Ltd. Device a222
 |                        \-00.3  Huawei Technologies Co., Ltd. Device a221
 +-[0000:bb]---00.0  Huawei Technologies Co., Ltd. Device a122
 +-[0000:ba]-+-00.0  Huawei Technologies Co., Ltd. Device a23b
 |           +-01.0  Huawei Technologies Co., Ltd. Device a239
 |           \-02.0  Huawei Technologies Co., Ltd. Device a238
 +-[0000:b8]-+-00.0-[b9]----00.0  Huawei Technologies Co., Ltd. Device a258
 |           \-01.0  Huawei Technologies Co., Ltd. Device a25a
 +-[0000:b4]-+-00.0-[b5]----00.0  Huawei Technologies Co., Ltd. Device a250
 |           +-01.0-[b6]----00.0  Huawei Technologies Co., Ltd. Device a255
 |           +-02.0  Huawei Technologies Co., Ltd. Device a230
 |           +-03.0  Huawei Technologies Co., Ltd. Device a235
 |           \-04.0  Huawei Technologies Co., Ltd. Device a230
 +-[0000:80]-+-00.0-[81]--
 |           +-04.0-[82]--
 |           +-08.0-[83]--
 |           +-0c.0-[84]--
 |           \-10.0-[85]--+-00.0  Intel Corporation 82599ES 10-Gigabit SFI/SFP+ Network Connection
 |                        \-00.1  Intel Corporation 82599ES 10-Gigabit SFI/SFP+ Network Connection
 +-[0000:7c]---00.0-[7d]--+-00.0  Huawei Technologies Co., Ltd. Device a222
 |                        +-00.1  Huawei Technologies Co., Ltd. Device a221
 |                        +-00.2  Huawei Technologies Co., Ltd. Device a222
 |                        \-00.3  Huawei Technologies Co., Ltd. Device a221
 +-[0000:7b]---00.0  Huawei Technologies Co., Ltd. Device a122
 +-[0000:7a]-+-00.0  Huawei Technologies Co., Ltd. Device a23b
 |           +-01.0  Huawei Technologies Co., Ltd. Device a239
 |           \-02.0  Huawei Technologies Co., Ltd. Device a238
 +-[0000:78]-+-00.0-[79]----00.0  Huawei Technologies Co., Ltd. Device a258
 |           \-01.0  Huawei Technologies Co., Ltd. Device a25a
 +-[0000:74]-+-00.0-[75]----00.0  Huawei Technologies Co., Ltd. Device a250
 |           +-01.0-[76]----00.0  Huawei Technologies Co., Ltd. Device a255
 |           +-02.0  Huawei Technologies Co., Ltd. Device a230
 |           +-03.0  Huawei Technologies Co., Ltd. Device a235
 |           \-04.0  Huawei Technologies Co., Ltd. Device a230
 \-[0000:00]-+-00.0-[01]--
             +-04.0-[02]--
             +-08.0-[03]--
             +-0c.0-[04]--
             +-10.0-[05]----00.0  Huawei Technologies Co., Ltd. Device 1710
             +-11.0-[06]----00.0  Huawei Technologies Co., Ltd. Hi1710 [iBMC Intelligent Management system chip w/VGA support]
             \-12.0-[07]--
suse-42:~ # 
suse-42:~ # 
suse-42:~ # 
suse-42:~ # 
suse-42:~ # 
suse-42:~ # 
suse-42:~ # echo 1 > /sys/devices/pci0000:80/0000:80:10.0/0000:85:00.0/sriov_num 
vfs
suse-42:~ # [  471.021340] Internal error: Oops: 96000004 [#1] SMP
[  471.026206] Modules linked in: ixgbevf(+) ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables devlink af_packet br_netfilter bridge stp llc rpcrdma xfs libcrc32c sunrpc rdma_ucm ib_iser rdma_cm iw_cm ib_cm libiscsi scsi_transport_iscsi nls_iso8859_1 nls_cp437 vfat fat hns_roce_hw_v2 hns_roce raid0 ib_uverbs md_mod ib_core ixgbe realtek aes_ce_blk crypto_simd cryptd aes_ce_cipher crc32_ce crct10dif_ce hns3 ghash_ce ipmi_ssif aes_arm64 joydev ses enclosure xfrm_algo sha2_ce sha256_arm64 sha1_ce sbsa_gwdt mdio hclge hnae3 ipmi_si ipmi_devintf ipmi_msghandler button gpio_dwapb cppc_cpufreq btrfs xor zstd_decompress zstd_compress xxhash raid6_pq hid_generic usbhid ohci_pci hibmc_drm drm_kms_helper syscopyarea sysfillrect sysimgblt xhci_pci fb_sys_fops ttm xhci_hcd ohci_hcd
[  471.096927]  ehci_pci ehci_hcd drm usbcore hisi_sas_v3_hw hisi_sas_main libsas scsi_transport_sas drm_panel_orientation_quirks sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua efivarfs
[  471.114329] Supported: Yes
[  471.117026] CPU: 64 PID: 4091 Comm: kworker/64:0 Not tainted 4.12.14-100-default #1 SLE12-SP5
[  471.125510] Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS 2280-V2 CS V3.26.01 06/14/2019
[  471.134171] Workqueue: events work_for_cpu_fn
[  471.138508] task: ffffd5f2b229a280 task.stack: ffffd5f2b63f4000
[  471.144400] pstate: 00400089 (nzcv daIf +PAN -UAO)
[  471.149212] pc : ixgbe_ipsec_vf_clear+0x60/0xd0 [ixgbe]
[  471.154430] lr : ixgbe_rcv_msg_from_vf+0x6cc/0xecc [ixgbe]
[  471.159889] sp : ffffd5f2bfa908f0
[  471.163188] x29: ffffd5f2bfa908f0 x28: 0000000000000000 
[  471.168476] x27: ffffd612b8b24900 x26: 0000000000000004 
[  471.173764] x25: 0000000000000004 x24: ffffd5f2b337a900 
[  471.179051] x23: ffffd5f2b3361900 x22: 0000000000000000 
[  471.184339] x21: 0000000000000000 x20: 0000000000000000 
[  471.189627] x19: 0000000000000000 x18: ffffd5f2b63f7cf8 
[  471.194915] x17: ffff34558da89bd0 x16: 000000000000000e 
[  471.200202] x15: 0000000000000007 x14: ffff34558b4e3b98 
[  471.205490] x13: ffff34558b4e3a10 x12: 0000000000000000 
[  471.210778] x11: 00000000000008e4 x10: 0000000000000001 
[  471.216066] x9 : 00000000000008e5 x8 : ffffd612beead4f8 
[  471.221353] x7 : 0000000000000000 x6 : 0000000000000000 
[  471.226641] x5 : ffff34558ac49b98 x4 : 0000000000000000 
[  471.229621] ixgbe 0000:85:00.0 eth8: NIC Link is Up 10 Gbps, Flow Control: RX/TX
[  471.231930] x3 : 000000000000f100 x2 : ffffd612b8b24900 
[  471.244593] x1 : 0000000000000000 x0 : ffff34558ac597f8 
[  471.244596] Process kworker/64:0 (pid: 4091, stack limit = 0xffffd5f2b63f4000)
[  471.244597] Call trace:
[  471.244618]  ixgbe_ipsec_vf_clear+0x60/0xd0 [ixgbe]
[  471.244637]  ixgbe_rcv_msg_from_vf+0x6cc/0xecc [ixgbe]
[  471.269514]  ixgbe_msg_task+0x218/0x304 [ixgbe]
[  471.269532]  ixgbe_msix_other+0x1e0/0x2f0 [ixgbe]
[  471.278709]  __handle_irq_event_percpu+0x7c/0x214
[  471.278711]  handle_irq_event_percpu+0x28/0x60
[  471.278712]  handle_irq_event+0x50/0x80
[  471.278715]  handle_fasteoi_irq+0xb4/0x140
[  471.295713]  generic_handle_irq+0x34/0x4c
[  471.295715]  __handle_domain_irq+0x6c/0xc4
[  471.303784]  gic_handle_irq+0xa0/0x1b8
[  471.303785]  el1_irq+0xb0/0x140
[  471.303788]  arch_counter_get_cntpct+0x20/0x60
[  471.303791]  __delay+0x3c/0x58
[  471.303793]  __udelay+0x38/0x44
[  471.321253]  ixgbevf_write_posted_mbx+0x88/0xa8 [ixgbevf]
[  471.321259]  ixgbevf_reset_hw_vf+0xa4/0x14c [ixgbevf]
[  471.331659]  ixgbevf_probe+0x314/0x8dc [ixgbevf]
[  471.331662]  local_pci_probe+0x48/0xb0
[  471.339991]  work_for_cpu_fn+0x24/0x34
[  471.339992]  process_one_work+0x15c/0x38c
[  471.347714]  worker_thread+0x1f0/0x3fc
[  471.347716]  kthread+0x108/0x134
[  471.347717]  ret_from_fork+0x10/0x20
[  471.347719] Code: 6b15003f 54000320 f1404a9f 54000060 (79400260) 
[  471.347741] ---[ end trace 86958f0a15035c6a ]---
Comment 1 Alynx Zhou 2019-07-08 03:27:02 UTC
This seems a kernel patch, so I assign it to kernel-default's bug owner. If incorrect please re-assign, thanks!
Comment 3 Swamp Workflow Management 2019-07-15 10:15:44 UTC
This is an autogenerated message for OBS integration:
This bug (1140228) was mentioned in
https://build.opensuse.org/request/show/715440 15.1 / kernel-source
Comment 4 Swamp Workflow Management 2019-07-15 19:16:51 UTC
SUSE-SU-2019:1854-1: An update that solves 6 vulnerabilities and has 69 fixes is now available.

Category: security (important)
Bug References: 1051510,1071995,1088047,1098633,1103990,1103991,1103992,1106383,1109837,1111666,1112374,1114685,1119113,1119532,1120423,1125703,1128902,1130836,1131645,1132390,1133401,1133738,1134303,1134395,1135556,1135642,1135897,1136161,1136264,1136343,1136935,1137625,1137728,1138879,1139712,1139751,1139771,1139865,1140133,1140228,1140328,1140405,1140424,1140428,1140454,1140463,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992
CVE References: CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11599,CVE-2019-13233
Sources used:
SUSE Linux Enterprise Workstation Extension 15-SP1 (src):    kernel-default-4.12.14-197.10.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    dtb-aarch64-4.12.14-197.10.1, kernel-debug-4.12.14-197.10.1, kernel-default-4.12.14-197.10.1, kernel-docs-4.12.14-197.10.1, kernel-kvmsmall-4.12.14-197.10.1, kernel-obs-qa-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-vanilla-4.12.14-197.10.1, kernel-zfcpdump-4.12.14-197.10.1
SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src):    kernel-default-4.12.14-197.10.1
SUSE Linux Enterprise Module for Development Tools 15-SP1 (src):    kernel-docs-4.12.14-197.10.1, kernel-obs-build-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-syms-4.12.14-197.10.1
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):    kernel-default-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-zfcpdump-4.12.14-197.10.1
SUSE Linux Enterprise High Availability 15-SP1 (src):    kernel-default-4.12.14-197.10.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2019-07-15 19:37:44 UTC
SUSE-SU-2019:1854-1: An update that solves 6 vulnerabilities and has 69 fixes is now available.

Category: security (important)
Bug References: 1051510,1071995,1088047,1098633,1103990,1103991,1103992,1106383,1109837,1111666,1112374,1114685,1119113,1119532,1120423,1125703,1128902,1130836,1131645,1132390,1133401,1133738,1134303,1134395,1135556,1135642,1135897,1136161,1136264,1136343,1136935,1137625,1137728,1138879,1139712,1139751,1139771,1139865,1140133,1140228,1140328,1140405,1140424,1140428,1140454,1140463,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992
CVE References: CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11599,CVE-2019-13233
Sources used:
SUSE Linux Enterprise Workstation Extension 15-SP1 (src):    kernel-default-4.12.14-197.10.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    dtb-aarch64-4.12.14-197.10.1, kernel-debug-4.12.14-197.10.1, kernel-default-4.12.14-197.10.1, kernel-docs-4.12.14-197.10.1, kernel-kvmsmall-4.12.14-197.10.1, kernel-obs-qa-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-vanilla-4.12.14-197.10.1, kernel-zfcpdump-4.12.14-197.10.1
SUSE Linux Enterprise Module for Live Patching 15-SP1 (src):    kernel-default-4.12.14-197.10.1, kernel-livepatch-SLE15-SP1_Update_3-1-3.3.1
SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src):    kernel-default-4.12.14-197.10.1
SUSE Linux Enterprise Module for Development Tools 15-SP1 (src):    kernel-docs-4.12.14-197.10.1, kernel-obs-build-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-syms-4.12.14-197.10.1
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):    kernel-default-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-zfcpdump-4.12.14-197.10.1
SUSE Linux Enterprise High Availability 15-SP1 (src):    kernel-default-4.12.14-197.10.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2019-07-20 10:22:58 UTC
openSUSE-SU-2019:1757-1: An update that solves 9 vulnerabilities and has 82 fixes is now available.

Category: security (important)
Bug References: 1051510,1071995,1088047,1094555,1098633,1103990,1103991,1103992,1106383,1109837,1111666,1112374,1114279,1114685,1119113,1119532,1120423,1125703,1128902,1130836,1132390,1133401,1133738,1134303,1134395,1135296,1135556,1135642,1135897,1136156,1136157,1136161,1136264,1136271,1136333,1136343,1136462,1136935,1137103,1137194,1137366,1137625,1137728,1137884,1137985,1138263,1138589,1138681,1138719,1138732,1138879,1139712,1139771,1139865,1140133,1140228,1140328,1140405,1140424,1140428,1140454,1140463,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992
CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11599,CVE-2019-12614,CVE-2019-12817,CVE-2019-13233
Sources used:
openSUSE Leap 15.1 (src):    kernel-debug-4.12.14-lp151.28.10.1, kernel-default-4.12.14-lp151.28.10.1, kernel-docs-4.12.14-lp151.28.10.1, kernel-kvmsmall-4.12.14-lp151.28.10.1, kernel-obs-build-4.12.14-lp151.28.10.1, kernel-obs-qa-4.12.14-lp151.28.10.1, kernel-source-4.12.14-lp151.28.10.1, kernel-syms-4.12.14-lp151.28.10.1, kernel-vanilla-4.12.14-lp151.28.10.1
Comment 7 Thomas Bogendoerfer 2019-07-31 10:13:28 UTC
Commit 

92924064106e ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw

is integrated in beta3
Comment 11 Swamp Workflow Management 2019-08-07 05:29:25 UTC
SUSE-SU-2019:2069-1: An update that solves 18 vulnerabilities and has 157 fixes is now available.

Category: security (important)
Bug References: 1051510,1055117,1071995,1083647,1083710,1088047,1094555,1098633,1103990,1103991,1103992,1104745,1106383,1109837,1111666,1112374,1114279,1114685,1119113,1119222,1119532,1120423,1123080,1125703,1127034,1127315,1127611,1128432,1128902,1129770,1130836,1132390,1133021,1133401,1133738,1134090,1134097,1134390,1134395,1134399,1134730,1134738,1135153,1135296,1135335,1135556,1135642,1135897,1136156,1136157,1136161,1136217,1136264,1136271,1136333,1136342,1136343,1136345,1136348,1136460,1136461,1136462,1136467,1137103,1137194,1137224,1137366,1137429,1137458,1137534,1137535,1137584,1137586,1137609,1137625,1137728,1137811,1137827,1137884,1137985,1138263,1138291,1138293,1138336,1138374,1138375,1138589,1138681,1138719,1138732,1138874,1138879,1139358,1139619,1139712,1139751,1139771,1139865,1140133,1140139,1140228,1140322,1140328,1140405,1140424,1140428,1140454,1140463,1140559,1140575,1140577,1140637,1140652,1140658,1140676,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140903,1140945,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992,1141312,1141401,1141402,1141452,1141453,1141454,1141478,1141558,1142023,1142052,1142083,1142112,1142115,1142119,1142220,1142221,1142265,1142350,1142351,1142354,1142359,1142450,1142623,1142673,1142701,1142868,1143003,1143105,1143185,1143189,1143191,1143209,1143507
CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2018-20855,CVE-2019-10638,CVE-2019-10639,CVE-2019-1125,CVE-2019-11478,CVE-2019-11599,CVE-2019-11810,CVE-2019-12614,CVE-2019-12817,CVE-2019-12818,CVE-2019-12819,CVE-2019-13233,CVE-2019-13631,CVE-2019-13648,CVE-2019-14283,CVE-2019-14284
Sources used:
SUSE Linux Enterprise Module for Public Cloud 15-SP1 (src):    kernel-azure-4.12.14-8.13.1, kernel-source-azure-4.12.14-8.13.1, kernel-syms-azure-4.12.14-8.13.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Swamp Workflow Management 2019-09-23 14:17:49 UTC
SUSE-SU-2019:2430-1: An update that solves 45 vulnerabilities and has 474 fixes is now available.

Category: security (important)
Bug References: 1050242,1050549,1051510,1052904,1053043,1055117,1055121,1055186,1056787,1058115,1061840,1064802,1065600,1065729,1066129,1070872,1071995,1075020,1082387,1082555,1083647,1083710,1085535,1085536,1088047,1088804,1093389,1094555,1096003,1098633,1099658,1102247,1103186,1103259,1103990,1103991,1103992,1104745,1106011,1106284,1106383,1106751,1108193,1108838,1108937,1109837,1110946,1111331,1111666,1111696,1112063,1112128,1112178,1112374,1113722,1113956,1114279,1114427,1114542,1114638,1114685,1115688,1117114,1117158,1117561,1118139,1119113,1119222,1119532,1119680,1120091,1120318,1120423,1120566,1120843,1120902,1122767,1122776,1123080,1123454,1123663,1124503,1124839,1125703,1126206,1126356,1126704,1127034,1127175,1127315,1127371,1127374,1127611,1127616,1128052,1128415,1128432,1128544,1128902,1128904,1128971,1128979,1129138,1129273,1129693,1129770,1129845,1130195,1130425,1130527,1130567,1130579,1130699,1130836,1130937,1130972,1131326,1131427,1131438,1131451,1131467,1131488,1131530,1131565,1131574,1131587,1131645,1131659,1131673,1131847,1131848,1131851,1131900,1131934,1131935,1132044,1132219,1132226,1132227,1132365,1132368,1132369,1132370,1132372,1132373,1132384,1132390,1132397,1132402,1132403,1132404,1132405,1132407,1132411,1132412,1132413,1132414,1132426,1132527,1132531,1132555,1132558,1132561,1132562,1132563,1132564,1132570,1132571,1132572,1132589,1132618,1132673,1132681,1132726,1132828,1132894,1132943,1132982,1133005,1133016,1133021,1133094,1133095,1133115,1133149,1133176,1133188,1133190,1133311,1133320,1133401,1133486,1133529,1133547,1133584,1133593,1133612,1133616,1133667,1133668,1133672,1133674,1133675,1133698,1133702,1133731,1133738,1133769,1133772,1133774,1133778,1133779,1133780,1133825,1133850,1133851,1133852,1133897,1134090,1134097,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134223,1134303,1134354,1134390,1134393,1134395,1134397,1134399,1134459,1134460,1134461,1134597,1134600,1134607,1134618,1134651,1134671,1134730,1134738,1134743,1134760,1134806,1134810,1134813,1134848,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135006,1135007,1135008,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135100,1135120,1135153,1135278,1135281,1135296,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135335,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1135897,1136156,1136157,1136161,1136188,1136206,1136215,1136217,1136264,1136271,1136333,1136342,1136343,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136462,1136467,1136469,1136477,1136478,1136498,1136573,1136586,1136598,1136881,1136922,1136935,1136978,1136990,1137103,1137151,1137152,1137153,1137162,1137194,1137201,1137224,1137232,1137233,1137236,1137366,1137372,1137429,1137444,1137458,1137534,1137535,1137584,1137586,1137609,1137625,1137728,1137739,1137752,1137811,1137827,1137884,1137985,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138263,1138291,1138293,1138336,1138374,1138375,1138589,1138681,1138719,1138732,1138874,1138879,1139358,1139619,1139712,1139751,1139771,1139865,1140133,1140139,1140228,1140322,1140328,1140405,1140424,1140428,1140454,1140463,1140559,1140575,1140577,1140637,1140652,1140658,1140676,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140903,1140945,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992,1141312,1141401,1141402,1141452,1141453,1141454,1141478,1141558,1142023,1142052,1142083,1142112,1142115,1142119,1142220,1142221,1142254,1142350,1142351,1142354,1142359,1142450,1142623,1142673,1142701,1142868,1143003,1143045,1143105,1143185,1143189,1143191,1143209,1143507
CVE References: CVE-2017-5753,CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2018-16871,CVE-2018-16880,CVE-2018-20836,CVE-2018-20855,CVE-2018-7191,CVE-2019-10124,CVE-2019-10638,CVE-2019-10639,CVE-2019-11085,CVE-2019-11091,CVE-2019-1125,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11599,CVE-2019-11810,CVE-2019-11811,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12614,CVE-2019-12817,CVE-2019-12818,CVE-2019-12819,CVE-2019-13233,CVE-2019-13631,CVE-2019-13648,CVE-2019-14283,CVE-2019-14284,CVE-2019-3846,CVE-2019-3882,CVE-2019-5489,CVE-2019-8564,CVE-2019-9003,CVE-2019-9500,CVE-2019-9503
Sources used:
SUSE Linux Enterprise Module for Realtime 15-SP1 (src):    kernel-rt-4.12.14-14.8.1, kernel-rt_debug-4.12.14-14.8.1, kernel-source-rt-4.12.14-14.8.1, kernel-syms-rt-4.12.14-14.8.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    kernel-rt-4.12.14-14.8.1, kernel-rt_debug-4.12.14-14.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.