Bugzilla – Bug 1140228
system will panic when 82599 enable vf
Last modified: 2019-09-23 14:45:32 UTC
We found a 82599 ipsec bug on 12.5. Requires community patch https://patchwork.ozlabs.org/patch/1104448/ to fix. suse-42:~ # lspci -tv -+-[0000:bc]---00.0-[bd]--+-00.0 Huawei Technologies Co., Ltd. Device a222 | +-00.1 Huawei Technologies Co., Ltd. Device a221 | +-00.2 Huawei Technologies Co., Ltd. Device a222 | \-00.3 Huawei Technologies Co., Ltd. Device a221 +-[0000:bb]---00.0 Huawei Technologies Co., Ltd. Device a122 +-[0000:ba]-+-00.0 Huawei Technologies Co., Ltd. Device a23b | +-01.0 Huawei Technologies Co., Ltd. Device a239 | \-02.0 Huawei Technologies Co., Ltd. Device a238 +-[0000:b8]-+-00.0-[b9]----00.0 Huawei Technologies Co., Ltd. Device a258 | \-01.0 Huawei Technologies Co., Ltd. Device a25a +-[0000:b4]-+-00.0-[b5]----00.0 Huawei Technologies Co., Ltd. Device a250 | +-01.0-[b6]----00.0 Huawei Technologies Co., Ltd. Device a255 | +-02.0 Huawei Technologies Co., Ltd. Device a230 | +-03.0 Huawei Technologies Co., Ltd. Device a235 | \-04.0 Huawei Technologies Co., Ltd. Device a230 +-[0000:80]-+-00.0-[81]-- | +-04.0-[82]-- | +-08.0-[83]-- | +-0c.0-[84]-- | \-10.0-[85]--+-00.0 Intel Corporation 82599ES 10-Gigabit SFI/SFP+ Network Connection | \-00.1 Intel Corporation 82599ES 10-Gigabit SFI/SFP+ Network Connection +-[0000:7c]---00.0-[7d]--+-00.0 Huawei Technologies Co., Ltd. Device a222 | +-00.1 Huawei Technologies Co., Ltd. Device a221 | +-00.2 Huawei Technologies Co., Ltd. Device a222 | \-00.3 Huawei Technologies Co., Ltd. Device a221 +-[0000:7b]---00.0 Huawei Technologies Co., Ltd. Device a122 +-[0000:7a]-+-00.0 Huawei Technologies Co., Ltd. Device a23b | +-01.0 Huawei Technologies Co., Ltd. Device a239 | \-02.0 Huawei Technologies Co., Ltd. Device a238 +-[0000:78]-+-00.0-[79]----00.0 Huawei Technologies Co., Ltd. Device a258 | \-01.0 Huawei Technologies Co., Ltd. Device a25a +-[0000:74]-+-00.0-[75]----00.0 Huawei Technologies Co., Ltd. Device a250 | +-01.0-[76]----00.0 Huawei Technologies Co., Ltd. Device a255 | +-02.0 Huawei Technologies Co., Ltd. Device a230 | +-03.0 Huawei Technologies Co., Ltd. Device a235 | \-04.0 Huawei Technologies Co., Ltd. Device a230 \-[0000:00]-+-00.0-[01]-- +-04.0-[02]-- +-08.0-[03]-- +-0c.0-[04]-- +-10.0-[05]----00.0 Huawei Technologies Co., Ltd. Device 1710 +-11.0-[06]----00.0 Huawei Technologies Co., Ltd. Hi1710 [iBMC Intelligent Management system chip w/VGA support] \-12.0-[07]-- suse-42:~ # suse-42:~ # suse-42:~ # suse-42:~ # suse-42:~ # suse-42:~ # suse-42:~ # echo 1 > /sys/devices/pci0000:80/0000:80:10.0/0000:85:00.0/sriov_num vfs suse-42:~ # [ 471.021340] Internal error: Oops: 96000004 [#1] SMP [ 471.026206] Modules linked in: ixgbevf(+) ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables devlink af_packet br_netfilter bridge stp llc rpcrdma xfs libcrc32c sunrpc rdma_ucm ib_iser rdma_cm iw_cm ib_cm libiscsi scsi_transport_iscsi nls_iso8859_1 nls_cp437 vfat fat hns_roce_hw_v2 hns_roce raid0 ib_uverbs md_mod ib_core ixgbe realtek aes_ce_blk crypto_simd cryptd aes_ce_cipher crc32_ce crct10dif_ce hns3 ghash_ce ipmi_ssif aes_arm64 joydev ses enclosure xfrm_algo sha2_ce sha256_arm64 sha1_ce sbsa_gwdt mdio hclge hnae3 ipmi_si ipmi_devintf ipmi_msghandler button gpio_dwapb cppc_cpufreq btrfs xor zstd_decompress zstd_compress xxhash raid6_pq hid_generic usbhid ohci_pci hibmc_drm drm_kms_helper syscopyarea sysfillrect sysimgblt xhci_pci fb_sys_fops ttm xhci_hcd ohci_hcd [ 471.096927] ehci_pci ehci_hcd drm usbcore hisi_sas_v3_hw hisi_sas_main libsas scsi_transport_sas drm_panel_orientation_quirks sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua efivarfs [ 471.114329] Supported: Yes [ 471.117026] CPU: 64 PID: 4091 Comm: kworker/64:0 Not tainted 4.12.14-100-default #1 SLE12-SP5 [ 471.125510] Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS 2280-V2 CS V3.26.01 06/14/2019 [ 471.134171] Workqueue: events work_for_cpu_fn [ 471.138508] task: ffffd5f2b229a280 task.stack: ffffd5f2b63f4000 [ 471.144400] pstate: 00400089 (nzcv daIf +PAN -UAO) [ 471.149212] pc : ixgbe_ipsec_vf_clear+0x60/0xd0 [ixgbe] [ 471.154430] lr : ixgbe_rcv_msg_from_vf+0x6cc/0xecc [ixgbe] [ 471.159889] sp : ffffd5f2bfa908f0 [ 471.163188] x29: ffffd5f2bfa908f0 x28: 0000000000000000 [ 471.168476] x27: ffffd612b8b24900 x26: 0000000000000004 [ 471.173764] x25: 0000000000000004 x24: ffffd5f2b337a900 [ 471.179051] x23: ffffd5f2b3361900 x22: 0000000000000000 [ 471.184339] x21: 0000000000000000 x20: 0000000000000000 [ 471.189627] x19: 0000000000000000 x18: ffffd5f2b63f7cf8 [ 471.194915] x17: ffff34558da89bd0 x16: 000000000000000e [ 471.200202] x15: 0000000000000007 x14: ffff34558b4e3b98 [ 471.205490] x13: ffff34558b4e3a10 x12: 0000000000000000 [ 471.210778] x11: 00000000000008e4 x10: 0000000000000001 [ 471.216066] x9 : 00000000000008e5 x8 : ffffd612beead4f8 [ 471.221353] x7 : 0000000000000000 x6 : 0000000000000000 [ 471.226641] x5 : ffff34558ac49b98 x4 : 0000000000000000 [ 471.229621] ixgbe 0000:85:00.0 eth8: NIC Link is Up 10 Gbps, Flow Control: RX/TX [ 471.231930] x3 : 000000000000f100 x2 : ffffd612b8b24900 [ 471.244593] x1 : 0000000000000000 x0 : ffff34558ac597f8 [ 471.244596] Process kworker/64:0 (pid: 4091, stack limit = 0xffffd5f2b63f4000) [ 471.244597] Call trace: [ 471.244618] ixgbe_ipsec_vf_clear+0x60/0xd0 [ixgbe] [ 471.244637] ixgbe_rcv_msg_from_vf+0x6cc/0xecc [ixgbe] [ 471.269514] ixgbe_msg_task+0x218/0x304 [ixgbe] [ 471.269532] ixgbe_msix_other+0x1e0/0x2f0 [ixgbe] [ 471.278709] __handle_irq_event_percpu+0x7c/0x214 [ 471.278711] handle_irq_event_percpu+0x28/0x60 [ 471.278712] handle_irq_event+0x50/0x80 [ 471.278715] handle_fasteoi_irq+0xb4/0x140 [ 471.295713] generic_handle_irq+0x34/0x4c [ 471.295715] __handle_domain_irq+0x6c/0xc4 [ 471.303784] gic_handle_irq+0xa0/0x1b8 [ 471.303785] el1_irq+0xb0/0x140 [ 471.303788] arch_counter_get_cntpct+0x20/0x60 [ 471.303791] __delay+0x3c/0x58 [ 471.303793] __udelay+0x38/0x44 [ 471.321253] ixgbevf_write_posted_mbx+0x88/0xa8 [ixgbevf] [ 471.321259] ixgbevf_reset_hw_vf+0xa4/0x14c [ixgbevf] [ 471.331659] ixgbevf_probe+0x314/0x8dc [ixgbevf] [ 471.331662] local_pci_probe+0x48/0xb0 [ 471.339991] work_for_cpu_fn+0x24/0x34 [ 471.339992] process_one_work+0x15c/0x38c [ 471.347714] worker_thread+0x1f0/0x3fc [ 471.347716] kthread+0x108/0x134 [ 471.347717] ret_from_fork+0x10/0x20 [ 471.347719] Code: 6b15003f 54000320 f1404a9f 54000060 (79400260) [ 471.347741] ---[ end trace 86958f0a15035c6a ]---
This seems a kernel patch, so I assign it to kernel-default's bug owner. If incorrect please re-assign, thanks!
This is an autogenerated message for OBS integration: This bug (1140228) was mentioned in https://build.opensuse.org/request/show/715440 15.1 / kernel-source
SUSE-SU-2019:1854-1: An update that solves 6 vulnerabilities and has 69 fixes is now available. Category: security (important) Bug References: 1051510,1071995,1088047,1098633,1103990,1103991,1103992,1106383,1109837,1111666,1112374,1114685,1119113,1119532,1120423,1125703,1128902,1130836,1131645,1132390,1133401,1133738,1134303,1134395,1135556,1135642,1135897,1136161,1136264,1136343,1136935,1137625,1137728,1138879,1139712,1139751,1139771,1139865,1140133,1140228,1140328,1140405,1140424,1140428,1140454,1140463,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992 CVE References: CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11599,CVE-2019-13233 Sources used: SUSE Linux Enterprise Workstation Extension 15-SP1 (src): kernel-default-4.12.14-197.10.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): dtb-aarch64-4.12.14-197.10.1, kernel-debug-4.12.14-197.10.1, kernel-default-4.12.14-197.10.1, kernel-docs-4.12.14-197.10.1, kernel-kvmsmall-4.12.14-197.10.1, kernel-obs-qa-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-vanilla-4.12.14-197.10.1, kernel-zfcpdump-4.12.14-197.10.1 SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src): kernel-default-4.12.14-197.10.1 SUSE Linux Enterprise Module for Development Tools 15-SP1 (src): kernel-docs-4.12.14-197.10.1, kernel-obs-build-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-syms-4.12.14-197.10.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): kernel-default-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-zfcpdump-4.12.14-197.10.1 SUSE Linux Enterprise High Availability 15-SP1 (src): kernel-default-4.12.14-197.10.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:1854-1: An update that solves 6 vulnerabilities and has 69 fixes is now available. Category: security (important) Bug References: 1051510,1071995,1088047,1098633,1103990,1103991,1103992,1106383,1109837,1111666,1112374,1114685,1119113,1119532,1120423,1125703,1128902,1130836,1131645,1132390,1133401,1133738,1134303,1134395,1135556,1135642,1135897,1136161,1136264,1136343,1136935,1137625,1137728,1138879,1139712,1139751,1139771,1139865,1140133,1140228,1140328,1140405,1140424,1140428,1140454,1140463,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992 CVE References: CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11599,CVE-2019-13233 Sources used: SUSE Linux Enterprise Workstation Extension 15-SP1 (src): kernel-default-4.12.14-197.10.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): dtb-aarch64-4.12.14-197.10.1, kernel-debug-4.12.14-197.10.1, kernel-default-4.12.14-197.10.1, kernel-docs-4.12.14-197.10.1, kernel-kvmsmall-4.12.14-197.10.1, kernel-obs-qa-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-vanilla-4.12.14-197.10.1, kernel-zfcpdump-4.12.14-197.10.1 SUSE Linux Enterprise Module for Live Patching 15-SP1 (src): kernel-default-4.12.14-197.10.1, kernel-livepatch-SLE15-SP1_Update_3-1-3.3.1 SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src): kernel-default-4.12.14-197.10.1 SUSE Linux Enterprise Module for Development Tools 15-SP1 (src): kernel-docs-4.12.14-197.10.1, kernel-obs-build-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-syms-4.12.14-197.10.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): kernel-default-4.12.14-197.10.1, kernel-source-4.12.14-197.10.1, kernel-zfcpdump-4.12.14-197.10.1 SUSE Linux Enterprise High Availability 15-SP1 (src): kernel-default-4.12.14-197.10.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2019:1757-1: An update that solves 9 vulnerabilities and has 82 fixes is now available. Category: security (important) Bug References: 1051510,1071995,1088047,1094555,1098633,1103990,1103991,1103992,1106383,1109837,1111666,1112374,1114279,1114685,1119113,1119532,1120423,1125703,1128902,1130836,1132390,1133401,1133738,1134303,1134395,1135296,1135556,1135642,1135897,1136156,1136157,1136161,1136264,1136271,1136333,1136343,1136462,1136935,1137103,1137194,1137366,1137625,1137728,1137884,1137985,1138263,1138589,1138681,1138719,1138732,1138879,1139712,1139771,1139865,1140133,1140228,1140328,1140405,1140424,1140428,1140454,1140463,1140575,1140577,1140637,1140658,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992 CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2019-10126,CVE-2019-10638,CVE-2019-10639,CVE-2019-11599,CVE-2019-12614,CVE-2019-12817,CVE-2019-13233 Sources used: openSUSE Leap 15.1 (src): kernel-debug-4.12.14-lp151.28.10.1, kernel-default-4.12.14-lp151.28.10.1, kernel-docs-4.12.14-lp151.28.10.1, kernel-kvmsmall-4.12.14-lp151.28.10.1, kernel-obs-build-4.12.14-lp151.28.10.1, kernel-obs-qa-4.12.14-lp151.28.10.1, kernel-source-4.12.14-lp151.28.10.1, kernel-syms-4.12.14-lp151.28.10.1, kernel-vanilla-4.12.14-lp151.28.10.1
Commit 92924064106e ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw is integrated in beta3
SUSE-SU-2019:2069-1: An update that solves 18 vulnerabilities and has 157 fixes is now available. Category: security (important) Bug References: 1051510,1055117,1071995,1083647,1083710,1088047,1094555,1098633,1103990,1103991,1103992,1104745,1106383,1109837,1111666,1112374,1114279,1114685,1119113,1119222,1119532,1120423,1123080,1125703,1127034,1127315,1127611,1128432,1128902,1129770,1130836,1132390,1133021,1133401,1133738,1134090,1134097,1134390,1134395,1134399,1134730,1134738,1135153,1135296,1135335,1135556,1135642,1135897,1136156,1136157,1136161,1136217,1136264,1136271,1136333,1136342,1136343,1136345,1136348,1136460,1136461,1136462,1136467,1137103,1137194,1137224,1137366,1137429,1137458,1137534,1137535,1137584,1137586,1137609,1137625,1137728,1137811,1137827,1137884,1137985,1138263,1138291,1138293,1138336,1138374,1138375,1138589,1138681,1138719,1138732,1138874,1138879,1139358,1139619,1139712,1139751,1139771,1139865,1140133,1140139,1140228,1140322,1140328,1140405,1140424,1140428,1140454,1140463,1140559,1140575,1140577,1140637,1140652,1140658,1140676,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140903,1140945,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992,1141312,1141401,1141402,1141452,1141453,1141454,1141478,1141558,1142023,1142052,1142083,1142112,1142115,1142119,1142220,1142221,1142265,1142350,1142351,1142354,1142359,1142450,1142623,1142673,1142701,1142868,1143003,1143105,1143185,1143189,1143191,1143209,1143507 CVE References: CVE-2018-16871,CVE-2018-20836,CVE-2018-20855,CVE-2019-10638,CVE-2019-10639,CVE-2019-1125,CVE-2019-11478,CVE-2019-11599,CVE-2019-11810,CVE-2019-12614,CVE-2019-12817,CVE-2019-12818,CVE-2019-12819,CVE-2019-13233,CVE-2019-13631,CVE-2019-13648,CVE-2019-14283,CVE-2019-14284 Sources used: SUSE Linux Enterprise Module for Public Cloud 15-SP1 (src): kernel-azure-4.12.14-8.13.1, kernel-source-azure-4.12.14-8.13.1, kernel-syms-azure-4.12.14-8.13.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:2430-1: An update that solves 45 vulnerabilities and has 474 fixes is now available. Category: security (important) Bug References: 1050242,1050549,1051510,1052904,1053043,1055117,1055121,1055186,1056787,1058115,1061840,1064802,1065600,1065729,1066129,1070872,1071995,1075020,1082387,1082555,1083647,1083710,1085535,1085536,1088047,1088804,1093389,1094555,1096003,1098633,1099658,1102247,1103186,1103259,1103990,1103991,1103992,1104745,1106011,1106284,1106383,1106751,1108193,1108838,1108937,1109837,1110946,1111331,1111666,1111696,1112063,1112128,1112178,1112374,1113722,1113956,1114279,1114427,1114542,1114638,1114685,1115688,1117114,1117158,1117561,1118139,1119113,1119222,1119532,1119680,1120091,1120318,1120423,1120566,1120843,1120902,1122767,1122776,1123080,1123454,1123663,1124503,1124839,1125703,1126206,1126356,1126704,1127034,1127175,1127315,1127371,1127374,1127611,1127616,1128052,1128415,1128432,1128544,1128902,1128904,1128971,1128979,1129138,1129273,1129693,1129770,1129845,1130195,1130425,1130527,1130567,1130579,1130699,1130836,1130937,1130972,1131326,1131427,1131438,1131451,1131467,1131488,1131530,1131565,1131574,1131587,1131645,1131659,1131673,1131847,1131848,1131851,1131900,1131934,1131935,1132044,1132219,1132226,1132227,1132365,1132368,1132369,1132370,1132372,1132373,1132384,1132390,1132397,1132402,1132403,1132404,1132405,1132407,1132411,1132412,1132413,1132414,1132426,1132527,1132531,1132555,1132558,1132561,1132562,1132563,1132564,1132570,1132571,1132572,1132589,1132618,1132673,1132681,1132726,1132828,1132894,1132943,1132982,1133005,1133016,1133021,1133094,1133095,1133115,1133149,1133176,1133188,1133190,1133311,1133320,1133401,1133486,1133529,1133547,1133584,1133593,1133612,1133616,1133667,1133668,1133672,1133674,1133675,1133698,1133702,1133731,1133738,1133769,1133772,1133774,1133778,1133779,1133780,1133825,1133850,1133851,1133852,1133897,1134090,1134097,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134223,1134303,1134354,1134390,1134393,1134395,1134397,1134399,1134459,1134460,1134461,1134597,1134600,1134607,1134618,1134651,1134671,1134730,1134738,1134743,1134760,1134806,1134810,1134813,1134848,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135006,1135007,1135008,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135100,1135120,1135153,1135278,1135281,1135296,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135335,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1135897,1136156,1136157,1136161,1136188,1136206,1136215,1136217,1136264,1136271,1136333,1136342,1136343,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136462,1136467,1136469,1136477,1136478,1136498,1136573,1136586,1136598,1136881,1136922,1136935,1136978,1136990,1137103,1137151,1137152,1137153,1137162,1137194,1137201,1137224,1137232,1137233,1137236,1137366,1137372,1137429,1137444,1137458,1137534,1137535,1137584,1137586,1137609,1137625,1137728,1137739,1137752,1137811,1137827,1137884,1137985,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138263,1138291,1138293,1138336,1138374,1138375,1138589,1138681,1138719,1138732,1138874,1138879,1139358,1139619,1139712,1139751,1139771,1139865,1140133,1140139,1140228,1140322,1140328,1140405,1140424,1140428,1140454,1140463,1140559,1140575,1140577,1140637,1140652,1140658,1140676,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140903,1140945,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992,1141312,1141401,1141402,1141452,1141453,1141454,1141478,1141558,1142023,1142052,1142083,1142112,1142115,1142119,1142220,1142221,1142254,1142350,1142351,1142354,1142359,1142450,1142623,1142673,1142701,1142868,1143003,1143045,1143105,1143185,1143189,1143191,1143209,1143507 CVE References: CVE-2017-5753,CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2018-16871,CVE-2018-16880,CVE-2018-20836,CVE-2018-20855,CVE-2018-7191,CVE-2019-10124,CVE-2019-10638,CVE-2019-10639,CVE-2019-11085,CVE-2019-11091,CVE-2019-1125,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11599,CVE-2019-11810,CVE-2019-11811,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12614,CVE-2019-12817,CVE-2019-12818,CVE-2019-12819,CVE-2019-13233,CVE-2019-13631,CVE-2019-13648,CVE-2019-14283,CVE-2019-14284,CVE-2019-3846,CVE-2019-3882,CVE-2019-5489,CVE-2019-8564,CVE-2019-9003,CVE-2019-9500,CVE-2019-9503 Sources used: SUSE Linux Enterprise Module for Realtime 15-SP1 (src): kernel-rt-4.12.14-14.8.1, kernel-rt_debug-4.12.14-14.8.1, kernel-source-rt-4.12.14-14.8.1, kernel-syms-rt-4.12.14-14.8.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): kernel-rt-4.12.14-14.8.1, kernel-rt_debug-4.12.14-14.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.